Back to list

Incident Overview

Incident ID CINC-20251220-303CFF36
Severity Medium (70)
Status new
Alert Count 26
Host Count 1

Timeline

First Seen 2025-12-18 08:45:14
Last Seen 2025-12-18 19:31:37
Duration 0d 10h 46m
Created 2025-12-20 13:23
Updated 2026-01-13 15:14

Kill Chain Analysis

Rec... Ini... Exe... Per... Pri... Def... Cre... Dis... Lat... Col... Com... Exf... Imp...
Observed Tactics:
Machine Learning
Techniques:
Sensor-based ML

Affected Hosts (1)

TEAHEE

Related Alerts (26)

Severity Status Hostname Description Tactic Command Line Time
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 19:31
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 13:49
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 12:49
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 11:49
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 10:49
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 09:49
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 09:21
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 09:21
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 09:17
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 09:17
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 09:13
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 09:13
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 09:09
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 09:09
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 09:05
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 09:05
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 09:01
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 09:01
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 08:57
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 08:57
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 08:53
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 08:53
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 08:49
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 08:49
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 08:45
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-18 08:45