Back to list

Incident Overview

Incident ID CINC-20251220-9D9E7027
Severity Medium (70)
Status new
Alert Count 21
Host Count 1

Timeline

First Seen 2025-12-20 07:12:22
Last Seen 2025-12-20 08:16:06
Duration 0d 1h 3m
Created 2025-12-20 13:23
Updated 2026-01-13 15:14

Kill Chain Analysis

Rec... Ini... Exe... Per... Pri... Def... Cre... Dis... Lat... Col... Com... Exf... Imp...
Observed Tactics:
Machine Learning
Techniques:
Sensor-based ML

Affected Hosts (1)

TEAHEE

Related Alerts (21)

Severity Status Hostname Description Tactic Command Line Time
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 08:16
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:48
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:48
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:44
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:44
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:40
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:40
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:36
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:36
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:32
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:32
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:28
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:28
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:24
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:24
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:20
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:20
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:16
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:16
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:12
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-20 07:12