Back to list

Incident Overview

Incident ID CINC-20251220-F2B6D177
Severity Critical (90)
Status new
Alert Count 6
Host Count 1

Timeline

First Seen 2025-12-18 19:37:28
Last Seen 2025-12-18 19:38:39
Duration 0d 0h 1m
Created 2025-12-20 13:23
Updated 2026-01-13 15:14

Kill Chain Analysis

Rec... Ini... Exe... Per... Pri... Def... Cre... Dis... Lat... Col... Com... Exf... Imp...
Observed Tactics:
Defense Evasion Credential Access Execution
Techniques:
Indicator Removal OS Credential Dumping PowerShell User Execution

Affected Hosts (1)

TEAHEE

Related Alerts (6)

Severity Status Hostname Description Tactic Command Line Time
High new TEAHEE A process removed or cleared Windows Event Logs. Adversaries may clear Windows Event Logs to hide the activity of an intrusion. Investigate the process tree. Defense Evasion wevtutil cl Security 12-18 19:38
Critical new TEAHEE A process saved the Security Account Manager SAM or SYSTEM hive to disk. If this is unexpected, it likely indicates credential theft. Investigate the process tree. Credential Access reg save HKLM\SECURITY C:\Users\dokji\AppData\Local\Temp\security.hiv 12-18 19:38
High new TEAHEE A PowerShell script attempted to bypass Microsoft's AntiMalware Scan Interface (AMSI). PowerShell exploit kits often attempt to bypass AMSI to evade detection. Review the script. Execution C:\WINDOWS\system32\cmd.exe /c "powershell Set-MpPreference -DisableRealtimeMonitoring $true" 12-18 19:38
High new TEAHEE A process appears to be launching mimikatz, a password dumping utility. mimikatz's primary purpose is to steal passwords. If credentials were dumped, change your passwords and investigate further. Credential Access C:\WINDOWS\system32\cmd.exe /c "powershell -c "sekurlsa::logonpasswords"" 12-18 19:38
Critical new TEAHEE A process saved the Security Account Manager SAM or SYSTEM hive to disk. If this is unexpected, it likely indicates credential theft. Investigate the process tree. Credential Access reg save HKLM\SAM C:\Users\dokji\AppData\Local\Temp\sam.hiv 12-18 19:38
Informational new TEAHEE A process has written a known EICAR test file. Review the files written by the triggered process. Execution "python" mega_incident_generator.py --rounds 2 --interval 30 12-18 19:37